15.11.2012 Views

Military Intelligence Professional Bulletin - Federation of American ...

Military Intelligence Professional Bulletin - Federation of American ...

Military Intelligence Professional Bulletin - Federation of American ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

MIPB<br />

Operations in OEF<br />

April - June<br />

2009<br />

PB 34-O9-2<br />

Afghanistan


FROM THE EDITOR<br />

In this issue, three articles <strong>of</strong>fer perspectives on operations in Afghanistan. Captain Nenchek discusses<br />

the philosophy <strong>of</strong> the evolving insurgent “syndicates,” who are working together to resist the<br />

changes and ideas the Coalition Forces bring to Afghanistan. Captain Beall relates his experiences in<br />

employing Human <strong>Intelligence</strong> Collection Teams at the company level in both Iraq and Afghanistan.<br />

Lieutenant Colonel Lawson provides a look into the balancing act U.S. Army chaplains as non-combatants<br />

in Afghanistan are involved in with regards to Information Operations.<br />

Colonel Reyes discusses his experiences as the MNF-I C2 CIOC Chief, detailing the problems and<br />

solutions to streamlining the intelligence effort. First Lieutenant Winwood relates her experiences in<br />

integrating intelligence support into psychological operations.<br />

From a doctrinal standpoint, Lieutenant Colonels McDonough and Conway review the evolution <strong>of</strong><br />

priority intelligence requirements from a combined operations/intelligence view. Mr. Jack Kem discusses<br />

the constructs <strong>of</strong> assessment during operations–measures <strong>of</strong> effectiveness and measures <strong>of</strong> performance,<br />

common discussion threads in several articles in this issue.<br />

George Van Otten sheds light on a little known issue on our southern border, that <strong>of</strong> the illegal immigration<br />

and smuggling activities which use the Tohono O’odham Reservation as a corridor and <strong>of</strong>fers<br />

some solutions for combined agency involvement and training to stem the flow.<br />

Included in this issue is nomination information for the CSM Doug Russell Award as well as a biography<br />

<strong>of</strong> the 2009 winner.<br />

Our website is at https://icon.army.mil/<br />

If your unit or agency would like to receive MIPB at no cost, please email mipb@conus.army.mil and<br />

include a physical address and quantity desired or call the Editor at 520.5358.0956/DSN 879.0956.<br />

We are no longer accepting personal subscriptions. We mail to APOs. Please send any address corrections/changes<br />

to the above email address.<br />

Sterilla A. Smith<br />

Editor


MILITARY INTELLIGENCE<br />

PB 34-09-2 Volume 35 Number 2<br />

FEATURES<br />

April - June 2009<br />

Commanding General<br />

Major General John M. Custer III<br />

Deputy to the Commanding General<br />

Mr. Jerry V. Proctor<br />

Deputy Commanding General<br />

(Reserve Component)<br />

Brigadier General Joesph M. Wells<br />

Deputy Commander for Training<br />

Colonel Dennis A. Perkins<br />

Director, Directorate <strong>of</strong> Doctrine<br />

Colonel Michael J. Arinello<br />

Chief, ISR Operations Analysis<br />

Division<br />

Mr. Chet Brown<br />

MIPB Staff:<br />

Editor<br />

Sterilla A. Smith<br />

Design Director<br />

Patrick N. Franklin<br />

Design and Layout<br />

Patrick N. Franklin<br />

Lawrence Boyd<br />

Cover Design<br />

Lawrence Boyd<br />

Inside Back Cover<br />

Lawrence Boyd<br />

Issue Photographs<br />

Courtesy <strong>of</strong> the U.S. Army<br />

Purpose: The U.S. Army <strong>Intelligence</strong><br />

Center and Fort Huachuca (USAIC&FH)<br />

publishes the <strong>Military</strong> <strong>Intelligence</strong><br />

<strong>Pr<strong>of</strong>essional</strong> <strong>Bulletin</strong> (MIPB) quarterly<br />

under the provisions <strong>of</strong> AR 25-30. MIPB<br />

presents information designed to keep intelligence<br />

pr<strong>of</strong>essionals informed <strong>of</strong> current<br />

and emerging developments within<br />

the field and provides an open forum<br />

in which ideas; concepts; tactics, techniques,<br />

and procedures; historical perspectives;<br />

problems and solutions, etc.,<br />

can be exchanged and discussed for purposes<br />

<strong>of</strong> pr<strong>of</strong>essional development.<br />

Disclaimer: Views expressed are those<br />

<strong>of</strong> the authors and not those <strong>of</strong> the<br />

Department <strong>of</strong> Defense or its elements.<br />

The contents do not necessarily reflect<br />

<strong>of</strong>ficial U.S. Army positions and do not<br />

change or supersede information in any<br />

other U.S. Army publications.<br />

6 Observations as the MNF-I C2 CIOC Chief<br />

by Colonel D.J. Reyes<br />

10 War <strong>of</strong> Ideas: A New Way to View the Afghan Insurgency<br />

by Captain Margaret J. Nencheck<br />

13 <strong>Intelligence</strong> Support to Psychological Operations: The Ongoing Challenge<br />

by First Lieutenant Katie Winwood<br />

16 Understanding Priority <strong>Intelligence</strong> Requirements<br />

by Lieutenant Colonel William G. McDonough and Lieutenant Colonel John A.<br />

Conway<br />

24 Doctrinal Tension: The Chaplain and Information Operations<br />

by Chaplain (Lieutenant Colonel) Kenneth Lawson<br />

32 The HUMINT Heresies: The Disposition <strong>of</strong> Human <strong>Intelligence</strong> Collection<br />

in Counterinsurgency<br />

by Captain David Beall<br />

38 Illegal Immigration and Smuggling on the Tohono O’odham Reservation<br />

<strong>of</strong> Arizona: Opportunities for Applied <strong>Intelligence</strong> Training<br />

by George A. Van Otten, PhD<br />

46 BCST: The Army’s Premiere Battle Command Systems Collective Task<br />

Trainer<br />

by Major Michael Spears<br />

48 Assessment: Measures <strong>of</strong> Performance and Measures <strong>of</strong> Effectiveness<br />

by Colonel Jack D. Kem, PhD, U.S. Army, Retired<br />

2 Always Out Front<br />

3 CSM Forum<br />

51 Training the Corps<br />

WIT—The Battlefield<br />

Commander’s Force Multiplier<br />

in the CIED Fight<br />

by Major Chris Britt<br />

Fort Huachuca Invests in the<br />

Technological and Educational<br />

Development <strong>of</strong> Civilians<br />

by Mr. Richard K. Ward<br />

Embedded Training: What MI<br />

Needs in the Future<br />

by Ramona McCaa`<br />

59 20th Annual Bataan Memorial<br />

Death March<br />

Photos by Sergeant Austin<br />

Thomas<br />

By order <strong>of</strong> the Secretary <strong>of</strong> the Army:<br />

Official:<br />

JOYCE E. MORROW<br />

Administrative Assistant to the<br />

Secretary <strong>of</strong> the Army<br />

0919801<br />

DEPARTMENTS<br />

60 Buffalo Soldier Dedication<br />

Story and photos by Garlan<br />

Martens<br />

61 The <strong>Military</strong> <strong>Intelligence</strong><br />

Corps 2009 Hall <strong>of</strong> Fame<br />

Inductees<br />

70 <strong>Pr<strong>of</strong>essional</strong> Reader<br />

72 <strong>Intelligence</strong> Philatelic<br />

Vignettes by Mark Sommer<br />

73 Contact and Article<br />

Submission Information<br />

74-75 CG’s Reading List<br />

76 Nomination Information for<br />

the 2010 CSM Doug Russell<br />

Award<br />

Inside Back Cover: Sergeant<br />

Julian M. Jones, 2009 Doug<br />

Russell Award Recipient<br />

GEORGE W. CASEY JR.<br />

General, United States Army<br />

Chief <strong>of</strong> Staff


AlwAys Out FrOnt<br />

Major General John M. Custer III<br />

Commanding General<br />

U.S. Army <strong>Intelligence</strong> Center and Fort Huachuca<br />

On June 14, 2009, the U.S. Army celebrated 234 years <strong>of</strong> answering the call to duty. Since its inception<br />

in 1775 our Army has continued to evolve by becoming ever more flexible, innovative and better prepared<br />

to tackle new challenges. These characteristics will become increasingly important for our Army and<br />

our branch as we re-focus on Afghanistan as part <strong>of</strong> our expanding involvement in Operation Enduring<br />

Freedom (OEF).<br />

Looking at our Army’s history, whether it originated within the Continental Army or the State Militias,<br />

overcoming multifaceted adversity to achieve victory is our hallmark. The intelligence successes we<br />

have achieved together in this current conflict have required intense dedication to our pr<strong>of</strong>ession, innumerable<br />

personal hardships, the unwavering support <strong>of</strong> our loved ones, and all too <strong>of</strong>ten, the ultimate<br />

sacrifice <strong>of</strong> our brothers and sisters with whom we served. The lessons we have learned over<br />

these many years in which we have been engaged in OEF have come at a great cost that we will continue<br />

to bear. However, the sweat and blood which we have shed to pay for these lessons has also<br />

made us more determined, more agile, more pr<strong>of</strong>icient, and more assured <strong>of</strong> victory.<br />

The challenges and sacrifices we have all endured are not unique to our time. We share these hardships<br />

with those who formed our Army at its inception. I recently read a book entitled Founding Father<br />

about General George Washington’s experiences as the Commander <strong>of</strong> the Continental Army during<br />

the Revolutionary War. An introspective man, a great leader, a great Soldier, before becoming a great<br />

president, he feared his task might be too great for his talents. Yet under his leadership the Army<br />

endured years <strong>of</strong> misery and setbacks. Think about the men who served under his command. Those<br />

Continental Soldiers always seemed to be one misfortune away from defeat. They faced frequent shortages<br />

<strong>of</strong> food, supplies, medicine, and ammunition. For five years, Washington and his men continually<br />

faced defeat, death and internal setbacks. It took every ounce <strong>of</strong> courage, determination, faith, and a<br />

belief in what they were fighting for was truly worth the sacrifices each Soldier bore. After six years<br />

<strong>of</strong> fighting, on October 19, 1781, the Continental Army achieved victory with the surrender <strong>of</strong> British<br />

General Cornwallis at Yorktown.<br />

That’s persistence. That’s staying power. That’s what this Army was born with and born <strong>of</strong>, and that’s<br />

what our Army possesses today. It is this spirit <strong>of</strong> courage and tenacity that lives within each <strong>of</strong> us within<br />

<strong>Military</strong> <strong>Intelligence</strong> (MI) working every day to find and bring to justice the radical extremists who killed<br />

more than 3,000 <strong>of</strong> our innocent men, women, and children on September 11, 2001 and continue to<br />

threaten our nation.<br />

Still, there’s another aspect <strong>of</strong> our Army that we should be equally proud and will be increasingly<br />

important as the nature <strong>of</strong> this conflict evolves, and that is the degree <strong>of</strong> compassion and understanding<br />

U.S. Soldiers bring to the fight. Our adversaries know that <strong>American</strong> Soldiers will protect, care,<br />

and treat with dignity those whom we defeat or capture. Civilians with whom we come in contact do<br />

not fear our presence, for they know we understand their plight, their sacrifices, and their desire to<br />

live in peace.<br />

You’ve had to serve not just as Soldiers, but as diplomats; not just as Warfighters, but as peacekeepers.<br />

And with every new challenge, you have demonstrated the ability to rise to the occasion.<br />

(Continued on page 4)<br />

2 <strong>Military</strong> <strong>Intelligence</strong>


CsM FOruM<br />

Command Sergeant Major Gerardus Wyk<strong>of</strong>f<br />

Command Sergeant Major<br />

U.S. Army <strong>Intelligence</strong> Center and Fort Huachuca<br />

Earlier this month we celebrated the Army’s 234 th birthday. On June 14, 1775, our country’s founding<br />

fathers established the Continental Army in preparation for revolution against the British. In that<br />

regard, the Army has been around longer than the U.S. itself.<br />

What began as a mostly untrained group <strong>of</strong> 15,000 farmers and craftsmen has grown to become one<br />

<strong>of</strong> the largest, most elite and technologically advanced fighting forces in the world. The Army’s mission<br />

today remains much the same as it was more than two centuries ago–to champion the cause <strong>of</strong> freedom<br />

on our shores and abroad.<br />

Throughout the history <strong>of</strong> the Army, the noncommissioned <strong>of</strong>ficer (NCO) has played a vital role in<br />

the overall readiness <strong>of</strong> the force. Since 1775, the Army has set its NCOs apart from other enlisted<br />

Soldiers by insignia <strong>of</strong> grade. With more than 200 years <strong>of</strong> service, the U.S. Army’s NCO Corps has<br />

distinguished itself as the world’s most accomplished group <strong>of</strong> military pr<strong>of</strong>essionals.<br />

Through wars and military operations in every corner <strong>of</strong> the globe, America’s soldiers have served<br />

our country with bravery and pride. Seventeen U.S. presidents and 2,403 Medal <strong>of</strong> Honor recipients<br />

have served in the Army. Of those Medal <strong>of</strong> Honor recipients, almost half were NCOs. Thousands more<br />

heroes have sacrificed their lives in the name <strong>of</strong> liberty and millions have dedicated their lives to the<br />

service <strong>of</strong> their country.<br />

Historical and daily accounts <strong>of</strong> life as an NCO are exemplified by acts <strong>of</strong> courage, dedication, and willingness<br />

to do whatever it takes to complete the mission. In recognition <strong>of</strong> our commitment Secretary <strong>of</strong> the<br />

Army, Pete Geren, announced last October during the annual Association <strong>of</strong> the U.S. Army Conference,<br />

that 2009 will be the “Year <strong>of</strong> the NCO.” He stated that “the Army will accelerate the NCO development <strong>of</strong><br />

strategic initiatives, develop new initiatives that enhance training, education, capability, and utilization <strong>of</strong><br />

the NCO Corps, showcase the NCO story to the Army and the <strong>American</strong> people, honor the sacrifices and<br />

celebrate the contributions <strong>of</strong> the NCO Corps, past and present.” In its 234 year history, this is only the<br />

second time the Army has used this theme “Year <strong>of</strong> the NCO.”<br />

In the winter <strong>of</strong> 1778, during Valley Forge, Inspector General Friedrich von Steuben wrote the Army’s<br />

first manual, “The Blue Book” and described the importance <strong>of</strong> choosing the right soldiers as NCOs. “The<br />

order and discipline <strong>of</strong> a regiment depends so much upon their behavior, that only those who show their<br />

merit and good conduct are entitled to it.” NCOs have been celebrated for decorated service in military<br />

events ranging from Valley Forge to Gettysburg, to charges on Omaha Beach and battles along the Ho<br />

Chi Minh Trail, to current conflicts in Afghanistan and Iraq. NCOs have led from the front by providing<br />

purpose, direction, and motivation. The NCO Corps has and will always be the backbone supporting the<br />

greatest fighting power in the world!<br />

On May 20 th , Army Chief <strong>of</strong> Staff, General George W. Casey Jr. stated, “Any <strong>of</strong>ficer out here will tell you<br />

. . . that they are the <strong>of</strong>ficer that they are today, because there was an NCO behind them every step <strong>of</strong> the<br />

way. To some extent, all <strong>of</strong> us stand on the shoulders <strong>of</strong> great NCOs.”<br />

Today’s NCO is an innovative, competent, and pr<strong>of</strong>essional enlisted leader grounded in heritage, values<br />

and tradition. I encourage all NCOs to embody the Warrior Ethos and live the Army Values. We must lead<br />

by example, train from experience, maintain and enforce standards, take care <strong>of</strong> Soldiers and adapt to a<br />

(Continued on page 5)<br />

April - June 2009 3


AlwAys Out FrOnt (Continued from page 2)<br />

We’ll be victorious in this War on Terrorism. Of that I am absolutely certain and confident. It’s not<br />

just because <strong>of</strong> our overwhelming firepower, pr<strong>of</strong>essionalism, dedication, and the sweat and blood the<br />

men and women <strong>of</strong> our armed forces bring to the fight. We have a secret weapon on our side–the unwavering<br />

belief, shared with the Continental Army, that ours is the true cause <strong>of</strong> liberty, equality, and<br />

human freedom. Through your efforts the forces <strong>of</strong> darkness will be defeated. The forces who would<br />

turn the clock back on civilization will fail and the forces <strong>of</strong> light will be victorious. We will not fail in<br />

this fight.<br />

For over 200 years, the Army has been at the forefront <strong>of</strong> defending the freedom that makes our country<br />

such a very special place; a place where men and women are judged not by race, religion, creed, or family<br />

heritage, but on their individual merit. America has always been that flame burning bright where anyone<br />

with a desire to serve can excel with drive and talent.<br />

Every MI Soldier and the civilians serving alongside them are helping to write a new chapter in our Army’s<br />

glorious history. I know you will make it a proud chapter. Heritage is a burden on occasion. At other times<br />

it’s a great joy. Sometimes ‘Army Strong’ seems an understatement to me in describing what you do. Our<br />

nation may never know each <strong>of</strong> the individual successes made by MI pr<strong>of</strong>essionals serving around the<br />

world, but they will never forget the sacrifices and commitment you brought to this fight. Because <strong>of</strong> you<br />

the Army will proudly celebrate many birthdays in the future.<br />

Always Out Front!<br />

MG John Custer, Commanding General, U.S. Army <strong>Intelligence</strong> Center and Fort Huachuca,<br />

and Fort Huachuca’s youngest Soldier, PFC Garrett Bouldin cut the cake during the Army<br />

Birthday celebration on 12 June at Brown Parade Field.<br />

4 <strong>Military</strong> <strong>Intelligence</strong>


CsM FOruM<br />

(Continued from page 3)<br />

changing world. We are an important and essential part <strong>of</strong> the Army. The NCO Corps provides invaluable<br />

service and sacrifice in the line <strong>of</strong> duty. We continually prove our dedication and our willingness to make<br />

great sacrifices on behalf <strong>of</strong> our Nation. This goes not just for the Army, but for all services. NCOs <strong>of</strong> all<br />

branches are accomplishing great feats everyday that deserves recognition by the <strong>American</strong> public.<br />

I have witnessed first hand other nations, allies, and even our enemies seek out the expertise <strong>of</strong> our<br />

highly skilled, expertly trained, and pr<strong>of</strong>icient NCOs. They are amazed with our organization, skill set, initiative,<br />

and pr<strong>of</strong>essionalism. Most importantly, they are impressed with the level <strong>of</strong> respect given to our<br />

NCO Corps.<br />

NCOs understand the mission at hand. They are mentors, leaders, true pr<strong>of</strong>essionals. Above all, they<br />

take care <strong>of</strong> our Soldiers, Sailors, Airmen and Marines and ensure their safety. Although our military<br />

continues to challenge its service members with a heightened OPTEMPO, back to back deployments,<br />

and <strong>of</strong>ten times missions which seem unattainable, I encourage you to strive to remain relevant! I want<br />

to remind you <strong>of</strong> what Secretary <strong>of</strong> the Army, Pete Geren has said, “At the front <strong>of</strong> every Army mission<br />

in the U.S. or overseas, you’ll find NCOs. They know their mission, they know their equipment, and<br />

most importantly, they know their Soldiers.”<br />

I would like to relate the story <strong>of</strong> two amazing NCOs who were part <strong>of</strong> an event that truly changed the<br />

world. Before the USS Cole bombing, before 9/11, there was Somalia. On October 3, 1993 the world<br />

saw pictures <strong>of</strong> a dead <strong>American</strong> Soldier being dragged through the streets <strong>of</strong> Mogadishu, Somalia.<br />

Although Soldiers in every conflict and war have seen that level <strong>of</strong> hate, this was the first time the<br />

<strong>American</strong> public and the world saw it.<br />

Master Sergeant Gary Gordon and Sergeant First Class Randy Shugart were part <strong>of</strong> an operation that<br />

many people don’t even know had a name. That name was Operation Gothic Serpent. At the second crash<br />

site, the two Delta Snipers were inserted by helicopter (at their own request) to defend a crashed helicopter<br />

from hundreds <strong>of</strong> advancing Somalis in the Battle <strong>of</strong> Mogadishu.<br />

Ultimately both snipers were killed and the pilot, Michael Durant was taken hostage. But the fight<br />

that these NCOs showed left the impression to the Somali Militia that whomever they were protecting<br />

must be important, and perhaps that is why he wasn’t killed. SFC Shughart and MSG Gordon were<br />

the first Soldiers to be awarded Medals <strong>of</strong> Honor posthumously since the Vietnam War.<br />

Not every NCO will be put in a position to sacrifice his or her life. But every NCO will be expected to<br />

lead; they will be expected to make decisions that impact lives and missions. They will be expected to<br />

successfully complete missions, and they will be expected to live with the decisions that they make.<br />

We are at a point today that even junior NCOs are expected to take the level <strong>of</strong> responsibility <strong>of</strong> a senior<br />

NCO ten years ago. That may seem a tall order but the NCO Corps has been and always will be<br />

the backbone supporting the greatest fighting power in the world.<br />

NCOs Lead from the Front!<br />

April - June 2009 5


Introduction<br />

by Colonel D.J. Reyes<br />

From June 2007 through June 2008, I deployed to<br />

Iraq and served as the Multi-National Force-Iraq<br />

(MNF-I) C2 Combined <strong>Intelligence</strong> and Operations<br />

Center (CIOC) Chief. Like so many <strong>Military</strong> <strong>Intelligence</strong><br />

(MI) Soldiers returning again to Iraq, I had mixed<br />

feelings regarding the actual threat environment,<br />

how it changed or evolved, how I was going to<br />

understand the complexities, and how I would leverage<br />

the intelligence battlefield operating system<br />

capabilities to help the warfighters in the<br />

find, fix, finish, exploit, assess, and disseminate<br />

targeting process.<br />

This article is based on my own personal experience<br />

and observations during my tour. It outlines<br />

how I attempted to make sense <strong>of</strong> and develop processes<br />

into the system, provides some challenges<br />

faced, and <strong>of</strong>fers some recommendations for consideration<br />

to future CIOC chiefs as our military<br />

continues to support this endeavor.<br />

Organizational Analysis and Solutions<br />

1. Know your environment, know the plan, know the<br />

players, and know your capabilities. Realizing that<br />

the environment was complex, fluid, and involved<br />

aspects <strong>of</strong> PMESII (political, military, economic, social,<br />

information, and infrastructure) covering the<br />

tactical to strategic spectrum, I reviewed the MNF-I<br />

Commanding General’s (CG’s) Joint Campaign Plan<br />

(JCP) to understand the CG’s intent and vision. As I<br />

integrated into the daily battle rhythm <strong>of</strong> intelligence<br />

analysis, production and dissemination, I learned<br />

to appreciate the MNF-I network <strong>of</strong> key players. The<br />

diagram is only intended to illustrate the organizations<br />

that I was personally involved with for information<br />

flow and operational support.<br />

What it does not adequately capture is the intricate<br />

cross-flow <strong>of</strong> information among and between<br />

all <strong>of</strong> these organizations and the CIOC. Although<br />

the CIOC had a formal request for information/<br />

intelligence (RFI) system, there were multiple<br />

means <strong>of</strong> information sharing that resulted in ongoing<br />

actions or RFIs that were difficult to track.<br />

Thus, there was no single and comprehensive entry<br />

point into the CIOC. Another point to note on<br />

the diagram is the CIOC composition. We were<br />

fortunate to have robust interagency cell support,<br />

specifically the Defense <strong>Intelligence</strong> Agency (DIA),<br />

the National Geospatial-<strong>Intelligence</strong> Agency and<br />

the National Security Agency as well as the U.S.<br />

State Department.<br />

Although we had a good relationship with the<br />

other governmental organizations, we did not have<br />

embedded analytical support in the CIOC. This<br />

would have been most helpful in synchronizing intelligence<br />

and operations.<br />

6 <strong>Military</strong> <strong>Intelligence</strong><br />

BFC<br />

TF17<br />

TF HYDRA<br />

IFC<br />

MND-N<br />

MND-B<br />

MND-C<br />

MND-SE<br />

CJSOTF-AP<br />

TF TROY<br />

COIC<br />

TF16<br />

OCF-I<br />

TF714<br />

EUCOM<br />

MNC-I<br />

C2<br />

CIFC-A JAC<br />

Molesworth<br />

JASG MNSTC-I<br />

CIOC Chief<br />

A&P CM&D C2X CSG NGA<br />

ITFC DOMEX JDEC<br />

SCID CLE<br />

“C2 CIOC Enterprise”<br />

TF134<br />

JDIC<br />

MNF-I<br />

• STRATOPS<br />

• FSEC<br />

• SPA<br />

• STRATEFF<br />

• SJA<br />

• CIG<br />

• IO<br />

-------------------USEMB<br />

• POL<br />

DIA CENTCOM<br />

“Reachback”<br />

MNF-I C2 CIOC Chief<br />

MNF-I C2 CIOC Chief <strong>Intelligence</strong> and Information Flow<br />

<strong>Intelligence</strong> and Information Flow


Analytically, the CIOC provided a very capable,<br />

in-theater, all source fusion capability. How we tailored<br />

our efforts and support is covered later in<br />

the article. One <strong>of</strong> our challenges was providing the<br />

depth and fidelity <strong>of</strong> intelligence analysis that our<br />

broad audience required including, but not limited<br />

to, the CG, MNF-I and the various staffs, and the<br />

Iraqi intelligence, law enforcement, and judicial<br />

systems.<br />

During this phase, we identified the CIOC’s major<br />

essential tasks, how we were configured to accomplish<br />

those tasks, who was accomplishing those<br />

tasks, and how we mitigated loss <strong>of</strong> key personnel<br />

due to rotation and transition/train up time. We<br />

categorized the CIOC functions into analytical support,<br />

administrative support and overhead; thereby<br />

narrowing the field <strong>of</strong> available analysts. We further<br />

broke down the analysts into three sub-categories <strong>of</strong><br />

expert, journeyman, and novice. The major criteria<br />

that distinguished the expert from the journeyman<br />

categories were the actual subject matter expertise<br />

(SME) on the specific topic and amount <strong>of</strong> time<br />

spent on the specific topic (“dwell time” whether in<br />

theater or via reachback).<br />

At the end <strong>of</strong> the study it became apparent<br />

that we had three layers <strong>of</strong> analyst pr<strong>of</strong>iciency.<br />

DIA (Joint <strong>Intelligence</strong> Task Force-Combating<br />

Terrorism and the Iraq cell (IZ)) mainly comprised<br />

the experts, along with a handful <strong>of</strong> CENTCOM<br />

analysts. U.S. Central Command (CENTCOM) and<br />

a handful <strong>of</strong> Worldwide Individual Augmentation<br />

System (WIAS) analysts comprised the journeymen.<br />

The majority <strong>of</strong> the WIAS analysts fell into<br />

the novice category. In September 2007, we provided<br />

this analysis to the senior MI leadership<br />

(DIA, CENTCOM, U.S. Army <strong>Intelligence</strong> and<br />

Security Command (INSCOM)) at Fort Belvoir,<br />

Virginia. One <strong>of</strong> the issues we discussed was balancing<br />

the need to support the CG, MNF-I with<br />

robust forward based analytical expertise against<br />

developing the required bench strength in sanctuary<br />

(reachback) and sustaining the trained and<br />

current pool <strong>of</strong> analysts.<br />

2. CIOC Functional and Physical Re-alignment<br />

Analysis. Based on the previously mentioned<br />

study, we had to ensure that we maximized our<br />

capabilities to provide the most responsive, accurate<br />

and predictive intelligence to the warfighters.<br />

We realized that we had to “flatten the organiza-<br />

tion command and control (C2) wise and information<br />

flow wise.” We intuitively understood that the<br />

identified core <strong>of</strong> experts would carry the heavy analytical<br />

load and briefings/products and that we<br />

would place demands on the intelligence community<br />

(IC) reachback infrastructure in the Beltway.<br />

We knew that the journeymen and novices would<br />

have to overcome a steep learning curve and still<br />

provide value added in support <strong>of</strong> the rapidly moving<br />

intelligence cycle.<br />

Additionally, we looked at whether CIOC physical<br />

realignment (identify sections that collaborated<br />

on the most common issues, and physically<br />

redesign the CIOC floor to better facilitate this<br />

flow <strong>of</strong> information and intelligence sharing) was<br />

feasible, made sense, and would outweigh any<br />

costs to interrupting OPTEMPO and timely intelligence<br />

support. Our methodology was to review<br />

the CIOC battle rhythm, given a snapshot<br />

in time. We captured a 45 day period, noted the<br />

daily CG MNF-I battle update assessment (BUA)<br />

notes, identified key comments and taskers to<br />

the C2, and grouped these into major issues. We<br />

then used Visio and Analyst Notebook programs<br />

to graphically associate these issues with the respective<br />

CIOC Analysis & Production (A&P) functional<br />

area sections (i.e., Sunni, Shi’a, national<br />

issues, etc.) On paper, we redesigned the CIOC<br />

main floor to physically position those sections<br />

that shared common issues.<br />

We discovered that, in many instances, more<br />

than one analytical section was in fact working on<br />

the same CG issue. Additionally, with some exceptions,<br />

the current physical layout <strong>of</strong> analysts on<br />

the main floor did not lend well to “c<strong>of</strong>fee breath<br />

close” analyst interaction across the various sections.<br />

However, the sheer logistical and information<br />

technology efforts required to relocate entire<br />

analytical sections would adversely impact continuous<br />

intelligence support to operations. So, for<br />

this phase, we ended up moving less than a handful<br />

<strong>of</strong> analysts to help synergize analytical efforts<br />

and information flow between the sections.<br />

3. Additional re-look based on “Knowledge Centers”<br />

concept. Not quite satisfied with the current structure,<br />

we continued our organizational re-look. We<br />

still had to flatten the organization for better responsiveness.<br />

To maximize success, we realized<br />

that we needed to align our efforts with the opera-<br />

April - June 2009 7


tional structure found in the MNF-I STRATOPS.<br />

Its structure revolved around operational planning<br />

teams that directly supported the JCP lines<br />

<strong>of</strong> operation (LOOs). Using CJCSM 3500.04D, 01<br />

August 2005, Joint Mission Essential Task List as<br />

our guide, and specifically Strategic-Theater (ST)<br />

Objective 2 “Conduct Theater Strategic <strong>Intelligence</strong>,<br />

Surveillance, and Reconnaissance”, 2.1 through<br />

2.26, we identified 38 CIOC tasks, in accordance<br />

with Annex G (<strong>Intelligence</strong>) JCP OIF, v.1,<br />

27 November 2007. We then cross walked these<br />

tasks to the current analysts on hand, and formed<br />

five major groups, or Knowledge Centers. These<br />

included the following:<br />

Ê Government <strong>of</strong> Iraq C2 (covered Ministries and<br />

Governance.)<br />

Ê Regional neighbors (Iran, Syria, Jordan, Turkey,<br />

Saudi Arabia, Kuwait.)<br />

Ê Countering Iranian influence.<br />

Ê Countering maligned actors influence.<br />

Ê Foreign terrorists/fighters.<br />

This reorganization greatly assisted CIOC efforts<br />

in identifying the daily OPTEMPO product requirements<br />

in concert with STRATOPS, STRATEFF and<br />

the Force Strategic Engagement Cell (FSEC), establishing<br />

the “core” <strong>of</strong> required SMEs, journeymen,<br />

and novices to focus on the problem sets, and mitigating<br />

the loss <strong>of</strong> fully trained analysts due to tour<br />

rotations. This, in turn, helped CENTCOM and DIA<br />

better support the mission via their reachback and<br />

forward deployed assets.<br />

During my tour, the CIOC was able to “build<br />

the SME bench strength” up to 22 to 25 SMEs<br />

from CENTCOM and DIA. What was also significant<br />

was the in-theater senior analytical firepower<br />

at the Senior Executive Service (SES) level. Rich<br />

Baffa (A&P Senior <strong>Intelligence</strong> Officer (SIO)), Tom<br />

Greco (CIOC SIO), and Dan O’Brien (DIA Forward<br />

Element, Iraq) provided the C2 with real time, forward<br />

based, executive level analysis, as well as<br />

critical reachback connectivity and support from<br />

the national IC. This proved to be the added edge<br />

we required to “think and analyze at the graduate<br />

level.”<br />

Lessons Learned<br />

Ê<br />

Flattening the organization for responsiveness is<br />

a good thing. However, we occasionally experienced<br />

the challenges <strong>of</strong> quality control and du-<br />

plication <strong>of</strong> effort due to the fact that some “in<br />

the chain” were unaware <strong>of</strong> ongoing actions or<br />

its status. Analysts at all levels must ensure,<br />

and leaders must demand, that information is<br />

passed to those who need to know.<br />

Products/deliverables tended to be living documents<br />

with constant updating due to the fast<br />

moving OPTEMPO and requirements. Although<br />

we strive for the 100 percent solution, perfection<br />

is <strong>of</strong>ten times the enemy <strong>of</strong> good enough given<br />

the environment and demands.<br />

Foreign Disclosure Officer (FDO)/Translator review<br />

was a huge issue and <strong>of</strong>ten times a staffing<br />

impediment. Forward based elements required<br />

robust FDO and translator capabilities that required<br />

quick turn approval from the stateside<br />

originating agencies. We encountered many situations<br />

where the FDO approval process was<br />

not responsive to the CG requirements directing<br />

the CIOC to brief and provide “releasable IZ<br />

and non-releasable IZ” level products on short<br />

notice that would help shape the conditions for<br />

furthering the CG’s JCP or other missions.<br />

Ensure that the right analysts are deployed to<br />

meet the requirements. We studied the TF 714<br />

rotation model that trained, deployed forward,<br />

then redeployed but maintained continued expertise<br />

by dwelling on the target from sanctuary.<br />

Both DIA and CENTCOM patterned their methodology<br />

on this process. The challenge, as stated<br />

earlier, was to ensure that the maximum time<br />

and numbers <strong>of</strong> analytical expert presence forward<br />

based occurred. Deployment times varied<br />

from as little as three months to a year. Our experience<br />

indicated that six months was the acceptable<br />

duration for expert level deployments,<br />

but we also realized the challenges associated<br />

with sustaining the analytical base in sanctuary.<br />

Finally, we were able to deliver at the four star<br />

level because the C2 had the SES team to help<br />

develop, shape and operationalize his vision.<br />

The same rigor in screening requirements for DIA<br />

and CENTCOM must be applied to contractor<br />

and WIAS analyst requirements. Although the<br />

requisite level <strong>of</strong> security clearance is a must,<br />

analytically qualified and experienced analysts<br />

are the standard.<br />

Establish tactics, techniques, and procedures<br />

on how to conduct business. This is another<br />

8 <strong>Military</strong> <strong>Intelligence</strong><br />

Ê<br />

Ê<br />

Ê<br />

Ê<br />

Ê


Ê<br />

Ê<br />

Ê<br />

Ê<br />

Ê<br />

time consuming task but it must be done to<br />

<strong>of</strong>fset the rapid personnel turnover and trainup<br />

time, and continuous OPTEMPO. Simple 3x5<br />

cards that outline, step by step, the required<br />

tasks to run the morning C2 preparatory session,<br />

CG roundtable briefings, develop daily<br />

BUA themes, etc., will get the team into a predictable<br />

battle rhythm, increase time efficiency,<br />

and reduce the stress associated with discovery<br />

learning.<br />

“No one wakes up in the morning wanting to<br />

fail.” Leaders at all levels must always positively<br />

coach, teach, and mentor their respective teams<br />

or sections. They must always believe, and make<br />

their troops believe, that regardless <strong>of</strong> the incredible<br />

tasks and impossible deadlines, they can<br />

and will accomplish the mission to standard.<br />

OPTEMPO required a formal C2 chief <strong>of</strong> staff to<br />

assist the C2 in orchestrating the various moving<br />

parts and missions in the Perfume Palace and<br />

downtown. I noted that the other MNF-I staffs<br />

had authorized chiefs <strong>of</strong> staff. To this end, I informally<br />

initiated weekly (Sunday) deconfliction<br />

meetings with the other O-6 staff heads to help<br />

synchronize efforts, share information, and focus<br />

intelligence support across the MNF-I staff.<br />

Next to the C2, the most important position in<br />

the C2 is the Deputy C2 (DC2). The DC2 needs<br />

to be operationally experienced, pr<strong>of</strong>icient in directing<br />

a staff, a leader, and a team builder and<br />

synchronizer. Anything less and the C2 risks<br />

fracture within his organization and mission<br />

failure.<br />

The MNF-I OPTEMPO <strong>of</strong>ten required coordination<br />

with the stateside IC during <strong>of</strong>f duty hours<br />

or weekends. This <strong>of</strong>ten created a synchronization<br />

challenge for our more senior analysts<br />

charged with the daily C2 0600 BUA updates<br />

and CG Sunday morning roundtable briefings.<br />

CENTCOM C2 noted this challenge and refocused<br />

his Tampa based IZ cell main effort and<br />

“local time” to Baghdad time. Although this understandably<br />

created a certain level <strong>of</strong> discomfort<br />

in CONUS, the CIOC analysts greatly appreciated<br />

the support to the main effort in Iraq.<br />

As stated earlier, not only does the CIOC provide<br />

timely, relevant and predictive strategic<br />

level intelligence to the CG, MNF-I and warfighters,<br />

but the intelligence helps shape the strate-<br />

gic battlespace for the MNF-I staff to prosecute<br />

the four LOOs (political, diplomatic, economic<br />

and security) in support <strong>of</strong> the JCP. Thus, intelligence<br />

must support the strategic information<br />

operations efforts (STRATEFF), operations<br />

(STRATOPS), engagements and reconciliation<br />

efforts with maligned individuals and groups<br />

(FSEC), and overall strategy, plans and policies<br />

as we evolve as an organization supporting the<br />

post Provincial Iraq Control (PIC) environment<br />

(Strategy Plans and Analysis).<br />

The physical separation from the MNF-I staff<br />

<strong>of</strong>ten created challenges involving priority <strong>of</strong><br />

support/work, information sharing, and coordinating<br />

efforts. However, we mitigated this shortfall<br />

by embedding intelligence <strong>of</strong>ficers across the<br />

MNF-I staff. The intent was to inject operationally<br />

savvy, and intelligence attuned <strong>of</strong>ficers who<br />

could leverage the CIOC’s capabilities, understand<br />

the staffing requirements and prioritize<br />

intelligence support, and ultimately help the operational<br />

staffers shape the battlefield conditions<br />

in order to successfully prosecute the JCP.<br />

The C2 was <strong>of</strong>ten tasked with supporting the<br />

detainee review board by providing compelling<br />

intelligence on various detainees, high value individuals,<br />

and maligned actors in order to justify<br />

their conviction in an Iraqi Court <strong>of</strong> Law. This<br />

proved to be difficult as intelligence analysis<br />

was not always translated into hard, evidentiary<br />

pro<strong>of</strong>. As we continue along the post-PIC timeline<br />

we can expect an increasing support role<br />

<strong>of</strong> this nature as MNF-I transitions more functions<br />

to the Government <strong>of</strong> Iraq. Continued collaborative<br />

efforts and formal education/sharing<br />

between the IC and the legal system will help<br />

mitigate some <strong>of</strong> these challenges.<br />

April - June 2009 9<br />

Ê<br />

Ê<br />

Colonel Reyes is currently serving in HQ, INSCOM as the<br />

G3, Director for Operations and Training, and will assume<br />

command <strong>of</strong> the 116 th MI Group (NSA Gordon) this summer.<br />

Prior to the CIOC deployment he commanded the Joint<br />

Analysis Center , Molesworth, UK. He has commanded and<br />

served in principal staff positions in MI, Infantry and Special<br />

Forces units, and also served in the J3, Joint Staff. Colonel<br />

Reyes previously deployed to OIF 1 as the G2, 101 st Airborne<br />

Division (AASLT).


Introduction<br />

For over seven years, <strong>American</strong> and international<br />

forces have been waging a bitter, forgotten war in<br />

Afghanistan. Recently, the Afghan conflict has risen<br />

in focus and prominence as the war in Iraq draws<br />

down and the international community realizes that<br />

the Taliban and global jihadists have not been defeated<br />

as easily or swiftly as was once thought. In<br />

order to defeat this resilient and adaptive foe, more<br />

than a “new strategy” must be applied to this problem<br />

set. The solution first requires a nuanced understanding<br />

<strong>of</strong> the nature <strong>of</strong> the Afghan insurgency and<br />

the myriad <strong>of</strong> factors influencing this situation.<br />

Mao has aptly compared guerrillas to fish, and the<br />

people to the water in which they swim. If the political<br />

temperature is right, the fish, however few in<br />

number, will thrive and proliferate. It is therefore the<br />

principal concern <strong>of</strong> all guerrilla leaders to get the<br />

water to the right temperature and to keep it there. 1<br />

Mao’s analogy <strong>of</strong> fish and the maintenance <strong>of</strong> political<br />

temperature is uniquely appropriate to the current<br />

evolution <strong>of</strong> the Afghan situation. Many insurgent<br />

groups and regional powerbrokers have a vested interest<br />

in the maintenance <strong>of</strong> a weak central government.<br />

Without the unifying presence in Kabul <strong>of</strong> a<br />

strong central government, enabled by a viable economy<br />

and represented regionally by effective Afghan<br />

National Security Forces, conditions will continue<br />

to be set for regional insurgents and transnational<br />

terrorists to proliferate. Afghan insurgents capitalize<br />

on the relative deprivation <strong>of</strong> the Afghan population.<br />

Discontent with the distribution <strong>of</strong> opportunity is a<br />

theme that insurgents have used to pull tribal youth<br />

away from the cultural tribal elders and toward sympathetic<br />

religious leaders. To understand the impact<br />

the Afghan insurgency has on this situation, a better<br />

understanding <strong>of</strong> the full-spectrum operational environment<br />

must be achieved.<br />

by Captain Margaret J. Nencheck<br />

The Insurgent Syndicate<br />

In his book, “Koran, Kalashnikov, and Laptop: The<br />

Neo-Taliban Insurgency in Afghanistan,” Antonio<br />

Giustozzi describes a crisis in Afghan rural society<br />

that has led to a “revolution <strong>of</strong> rising expectations.”<br />

He postulates that this situation cannot be resolved<br />

by the current counterinsurgency or development<br />

strategies for Afghanistan. In addition, the border<br />

issues and policy problems with Pakistan have exacerbated<br />

this problem. 2<br />

These factors have influenced the current operational<br />

environment in Afghanistan, which is dominated<br />

by an evolving insurgent syndicate strategy.<br />

It is a unique and adaptive force, comprised <strong>of</strong> competing<br />

insurgent elements which interact and cooperate<br />

in order to serve mutual tactical interests<br />

and contribute to their overall strategic objectives<br />

in Afghanistan and the greater area <strong>of</strong> interest. In<br />

Afghanistan, we have seen the emergence <strong>of</strong> two<br />

distinct insurgencies: a Kandahari-based Taliban in<br />

the south and a more complex, adaptive insurgency<br />

influenced, though not controlled, by Al Qaeda’s<br />

global jihad in the east.<br />

This insurgent syndicate operating within<br />

Afghanistan, the destabilizing influence <strong>of</strong> the<br />

Federally Administered Tribal Areas and the political<br />

situation inside Pakistan, as well as the<br />

level <strong>of</strong> support provided to various aspects <strong>of</strong> the<br />

Afghan insurgency by Al Qaeda have ensured that<br />

Mao’s “political temperature” within Afghanistan<br />

remains optimal for continued insurgent efforts.<br />

This situation has afforded the diverse enemy<br />

groups within the East to develop the emerging<br />

insurgent syndicate strategy. Based on necessity,<br />

these groups with otherwise divergent goals operate<br />

in harmony. Logistical disruption and setbacks<br />

caused by Coalition operations, as well as<br />

governance and development successes evident<br />

10 <strong>Military</strong> <strong>Intelligence</strong>


throughout Afghanistan, have given the insurgency<br />

reason to ally in order to retain local and<br />

regional relevance and to maximize the potential<br />

for tactical and operational results.<br />

Revolution vs. Resistance<br />

Small wars and counterinsurgency expert Bernard<br />

Fall studied the <strong>American</strong> and French experiences<br />

in Vietnam extensively. From his observations, he<br />

concluded that conflicts, and indeed, the conflicts<br />

<strong>of</strong> the “future,” would not be “sublimited warfare,”<br />

“insurgency,” or “counterinsurgency,” but:<br />

RW=G+P<br />

Or “revolutionary warfare (RW) equals guerrilla<br />

warfare (G) plus political action (P).” This formula<br />

for revolutionary warfare is the result <strong>of</strong> the application<br />

<strong>of</strong> guerrilla methods to the furtherance <strong>of</strong> an<br />

ideology or a political system. 3 This type <strong>of</strong> warfare<br />

is evident in Afghanistan; however, the endstate is<br />

not a revolution in the common understanding <strong>of</strong> the<br />

concept. Instead, it is more <strong>of</strong> a resistance to change<br />

and those ideas that run counter to their extremist<br />

ideology. The change being resisted is embodied in<br />

the Coalition’s efforts to bring democracy, freedom <strong>of</strong><br />

choice, and religious tolerance to Afghanistan. The<br />

global jihad <strong>of</strong> Al Qaeda is viewed as preferable to the<br />

more radical initiatives <strong>of</strong> the Coalition. All aspects <strong>of</strong><br />

the Afghan operational environment fall on the continuum<br />

between revolution and resistance. Pakistan<br />

falls along a similar continuum but is less impacted<br />

by Western revolutionary influences. The following<br />

graphic depicts this paradigm from the perspective<br />

<strong>of</strong> the Afghan populace:<br />

Scale <strong>of</strong> Revolutionary Warfare in Afghanistan<br />

Key:<br />

ISAF- International Security Assistance Force<br />

GIRoA – Government <strong>of</strong> the Islamic Republic <strong>of</strong> Afghanistan<br />

HiG – Hezb-e Islami Gulbuddin<br />

HiK – Hezb-E Islami Khalis<br />

TNSM – Tehrik Nefaz-e Shariat Mohammadi<br />

IMU – Islamic Movement <strong>of</strong> Uzbekistan<br />

LeT – Lashkar-e-Tayyiba<br />

TTiP – Tehrik Taliban-I Pakistan<br />

On one end <strong>of</strong> the scale <strong>of</strong> revolutionary warfare is<br />

“revolution.” This extreme is embodied by the U.S.<br />

and ISAF, which promote the concepts <strong>of</strong> democracy<br />

and universal rights–terms foreign and revolutionary<br />

to Afghanistan. On the other extreme <strong>of</strong> the<br />

continuum is Al Qaeda and its strategic goal to establish<br />

a pan-Islamic caliphate throughout the world<br />

by working with allied Islamic extremist groups to<br />

overthrow regimes it deems “non-Islamic”; to expel<br />

Westerners and non-Muslims from Muslim countries<br />

(particularly Saudi Arabia), and to attempt to carry<br />

out future attacks against the U.S. and its worldwide<br />

interests. Along this scale fall the different,<br />

though <strong>of</strong>ten cooperative, insurgent groups with<br />

varying degrees <strong>of</strong> separation between revolution<br />

and resistance.<br />

Lessons from Vietnam<br />

In 1968, Army Chief <strong>of</strong> Staff General H.K. Johnson<br />

briefed the new U.S.-Vietnamese strategy for<br />

Vietnam. It was aimed at destroying the revolutionary<br />

position using what was described as a “twopincers<br />

strategy”: a violence program and a rural<br />

construction program. 4 The violence program can<br />

be compared to a conventional Security line <strong>of</strong> operation<br />

focus; whereas the construction program is<br />

likened to the Governance and Development lines <strong>of</strong><br />

operation. At the time, the strategy was nearly all focused<br />

on the violence program, leaving only a small<br />

percentage <strong>of</strong> the overall effort to the rural construction<br />

program. It is evident that the <strong>American</strong> military<br />

approach to this conflict relied too heavily on<br />

an “umbrella theory,” which points to the allegedly<br />

April - June 2009 11


decisive role <strong>of</strong> the enemy’s conventional military<br />

forces and <strong>of</strong> pre-stocked bases. 5 Such an “umbrella<br />

theory” might be contrasted to Mao’s fish theory,<br />

according to which proper social conditions are decisive<br />

and, once these are achieved, make the enemy’s<br />

conventional military forces largely irrelevant. 6<br />

The strategy to counter the Afghan insurgency is<br />

falling into the same pattern as the umbrella theory,<br />

which is incapable <strong>of</strong> answering the revolution<br />

<strong>of</strong> rising expectations and allows the insurgency to<br />

keep the political temperature right to allow this<br />

conflict to survive.<br />

Conclusion<br />

While Afghan insurgents will always have a vested<br />

interest in a weak central government, it is critical<br />

to GIRoA and ISAF success to give the Afghan<br />

people capable governance enabled with stable and<br />

viable economic development. More than a renewed<br />

commitment, but increased resources along with<br />

a detailed and comprehensive plan for counterterrorism<br />

and counterinsurgency operations, must be<br />

levied in Afghanistan in order for Al Qaeda and the<br />

complex Afghan insurgency to be defeated.<br />

Endnotes<br />

1. FMFRP 12-18, Mao Tse-Tung on Guerilla Warfare, 1989, 8.<br />

2. Antonio Giustozzi, Koran, Kalashnikov, and Laptop: The Neo-<br />

Taliban Insurgency in Afghanistan (New York: Columbia University<br />

Press, 2008), 230, 232.<br />

3. Bernard Fall, “The Theory and Practice <strong>of</strong> Insurgency and<br />

Counterinsurgency,” Naval War College Review, Winter 1998, Vol. LI,<br />

No. 1, <strong>Military</strong> Module, 47 at http://www.carlisle.army.mil/ietcop/<br />

documents/NWCR%20-%20The%20Theory%20&%20Practice%20<br />

<strong>of</strong>%20Insurgency%20&%20COIN%20APR%2065.pdf.<br />

4. Jeffrey Race, War Comes to Long An: Revolutionary Conflict in a<br />

Vietnamese Province (University <strong>of</strong> California Press: Berkeley, 1973),<br />

224.<br />

5. Ibid., 226.<br />

6. Ibid., 227.<br />

Captain Nencheck is currently assigned as the Fusion Officerin-Charge<br />

in the CJ2 section for Combined Joint Task Force-<br />

101. She has been deployed in support <strong>of</strong> Operation Enduring<br />

Freedom IX for over 13 months. She has also served as Brigade<br />

Collection Manager, Battalion S2, and Platoon leader and is<br />

a veteran <strong>of</strong> Operation Iraqi Freedom. Captain Nencheck is a<br />

2004 Distinguished Graduate <strong>of</strong> the U.S. <strong>Military</strong> Academy.<br />

12 <strong>Military</strong> <strong>Intelligence</strong>


Perception management, influencing operations,<br />

product dissemination, measures <strong>of</strong> effectiveness,<br />

propaganda, persuasion<br />

Introduction<br />

These are buzzwords heard every day in the<br />

9 th Psychological Operations (PSYOP) Battalion<br />

(Airborne) headquarters as commanders and staff<br />

plan and prepare to support tactical PSYOP missions<br />

worldwide. I served in this unit for nearly nine<br />

months as the Battalion S2 after graduating from<br />

the <strong>Military</strong> <strong>Intelligence</strong> (MI) Basic Course. It was<br />

not, however, until my move from Battalion S2 to<br />

Company <strong>Intelligence</strong> Officer that the above phrases<br />

came to mean anything to me.<br />

Tactical PSYOP companies are attached to other<br />

units; therefore, intelligence requirements are<br />

typically met by the supported unit, similar to the<br />

way administrative needs are met. Unfortunately<br />

for an eager lieutenant fresh out <strong>of</strong> the basic<br />

course, being a Battalion S2 in PSYOP meant<br />

passports, clearances, and security management.<br />

I served under leaders who recognized this issue<br />

and within a few months the unit was willing<br />

to forfeit a battalion staff <strong>of</strong>ficer to be the first<br />

ever Tactical PSYOP Company <strong>Intelligence</strong> Officer.<br />

During my time in this position, I served in the<br />

Combined Joint Special Operations Task Force-<br />

Arabian Peninsula (CJSOTF-AP), among the military’s<br />

finest. Serving among men and women <strong>of</strong><br />

this caliber in the Special Operations Forces (SOF)<br />

community was not only intimidating, it was inspiring.<br />

With this new found respect and title I<br />

earnestly set out on a quest to crack the code on<br />

intelligence support to PSYOP.<br />

The Threat<br />

The first step for any intelligence pr<strong>of</strong>essional is<br />

to gain atmospherics on the current threat and in<br />

my case PSYOP preparation <strong>of</strong> the operational environment<br />

(OE). This included understanding the<br />

idealism that drove militias and high value individuals<br />

(HVIs), but more specifically it meant seeing<br />

the conflict from the Iraqi people’s perspective. To<br />

understand their perspective the OE must be put<br />

in context <strong>of</strong> culture, education, religious affilia-<br />

by First Lieutenant Katie Winwood<br />

tion, economic stature, history and every other anthropological<br />

consideration. Ultimately I was trying<br />

to understand how Coalition Forces could change<br />

perceptions, and eventually behaviors. Since I was<br />

mostly alone in my quest among my analyst peers, I<br />

found a way to simultaneously support Psychological<br />

Operations and bring a PSYOP perspective to SOF<br />

intelligence.<br />

The Challenge<br />

The concept <strong>of</strong> perception management or influencing<br />

with words is not always embraced in the<br />

Armed Forces and certainly was not in an organization<br />

as kinetic-based as CJSOTF-AP. However, after<br />

five years <strong>of</strong> lethal operations military planners<br />

at every level were forced to re-evaluate the need<br />

for such force and ultimately place more emphasis<br />

on non-kinetic effects. This transition was due in<br />

part to the success <strong>of</strong> the surge, the Sunni awakening,<br />

and the ceasefire agreement with Muqtada<br />

Al-Sadr (leader <strong>of</strong> a major Shia militia). But mostly it<br />

was the realization that changing perceptions may<br />

just be the key to getting out <strong>of</strong> Iraq. Through these<br />

turns <strong>of</strong> events PSYOP, and consequently intelligence<br />

support to PSYOP, received a level <strong>of</strong> interest<br />

at CJSOTF-AP that was unlikely given to PSYOP<br />

planners during the earlier phases <strong>of</strong> the war.<br />

PSYOP leaders took advantage <strong>of</strong> this momentum<br />

by making perception management a consideration<br />

on every mission and intimately integrating themselves<br />

within the J3. Conspiracy theories run rampant<br />

among a populace as ill informed as Iraq’s and<br />

experience has taught us if we don’t tell the story<br />

someone else will.<br />

Often times a three man Tactical PSYOP Team<br />

(TPT) is the only voice <strong>of</strong> an entire Army. <strong>Intelligence</strong><br />

support to these operations is critical and leaves little<br />

room for error. There is a common saying in the<br />

4 th PSYOP Group (A) that “no PSYOP is better than<br />

bad PSYOP,” and the same is true for intelligence.<br />

The majority <strong>of</strong> my work came before operations began<br />

and after they completed. This included finding<br />

April - June 2009 13


and confirming facts on HVIs used for posters and<br />

handbills, compiling imagery for leaflet drops, and<br />

analyzing enemy propaganda to see how our products<br />

might be viewed in light <strong>of</strong> the competition.<br />

TPT Operations<br />

After operations concluded, I would sift through<br />

endless reports from any source available in the<br />

hopes <strong>of</strong> capturing some shred <strong>of</strong> evidence that<br />

could be used to specifically identify the populace’s<br />

response to the operation or measure <strong>of</strong> effectiveness<br />

(MOE.) My efforts were sometimes in vain due<br />

to the difficulty in connecting effects directly to nonkinetic<br />

operations. In fact, attempting to tie behavioral<br />

changes directly to PSYOP is the single greatest<br />

challenge <strong>of</strong> MOE; it is impossible to know if behavior<br />

changes are the result <strong>of</strong> PSYOP because it will<br />

never be feasible to eliminate all external factors. To<br />

further frustrate the matter the changes that can be<br />

measured take months or even years to surface and<br />

unfortunately there may not always be boots on the<br />

ground to capture them.<br />

The Information<br />

When I wasn’t monitoring behavioral changes and<br />

non-kinetic effects, I focused on meeting the immediate<br />

intelligence needs <strong>of</strong> the Company through<br />

requests for information (RFIs.) In this regard my<br />

mission was not much different from other intelligence<br />

pr<strong>of</strong>essionals; however the nature and content<br />

<strong>of</strong> these RFIs varied greatly and consequently I could<br />

not always rely on conventional unit’s products or<br />

my fellow SOF analysts. The PSYOP Soldiers on the<br />

ground were more interested in perceptions than any<br />

other factor so I <strong>of</strong>ten researched symbolism, animal<br />

and color associations, clothing attire, susceptibilities<br />

to products like medical aid vs. soccer balls,<br />

local graffiti, regional verbiage, even tribal history.<br />

On one occasion in particular, I reached back to 1st<br />

Information Operations (IO) Command to better understand<br />

the value put on horses in Arabic culture.<br />

This inquiry eventually led to a well received product<br />

used to mourn the loss <strong>of</strong> a loved tribal leader.<br />

This type <strong>of</strong> research and eventual knowledge<br />

gave me a chance to support PSYOP with relevant<br />

timely intelligence and bring a PSYOP perspective to<br />

CJSOTF-AP. This dual support ultimately meant job<br />

security for me. As the first intelligence <strong>of</strong>ficer to deploy<br />

with a tactical PSYOP company at CJSOTF-AP,<br />

it was imperative that I distinguished that role from<br />

traditional support and establish some level <strong>of</strong> credibility<br />

for intelligence specific to PSYOP. I was enthusiastic<br />

about this task because I came into the<br />

deployment feeling very strongly about providing intelligence<br />

tailored to the greatest information manipulator<br />

in the OE. I came out <strong>of</strong> my deployment<br />

equally enthusiastic about this task but more realistic<br />

in my expectation <strong>of</strong> meeting it.<br />

The Way Ahead<br />

Veterans <strong>of</strong> MI and IO recognize the deficit that exists<br />

with regard to intelligence support. The consensus<br />

for a solution seems to be education. Providing<br />

good intelligence analysis is simple–doctrine and<br />

training reinforced with experience. A good analyst<br />

should know intelligence s<strong>of</strong>tware, data mining, basic<br />

analyses, and stand ready to support any unit,<br />

in any capacity. One <strong>of</strong> the toughest challenges facing<br />

intelligence support to PSYOP is understanding<br />

PSYOP information needs. This problem will only<br />

be resolved with mutual efforts between PSYOP and<br />

<strong>Intelligence</strong> to better understand each other. Most<br />

PSYOP specialists will tell you the Army doesn’t un-<br />

14 <strong>Military</strong> <strong>Intelligence</strong>


derstand what they do, and after an eight month<br />

deployment with a Tactical PSYOP Company I can<br />

tell you this is mostly true. Like any major military<br />

change it takes time, especially for veteran Soldiers,<br />

to relook the way they see the fight. This transformation<br />

has made significant progress over the last<br />

five years as reflected in current stability, counterinsurgency<br />

and operational field manuals, but there<br />

is still much work to be done. The PSYOP and intelligence<br />

community must embark upon integration<br />

training that focuses on change, with a mutual respect<br />

for what each branch brings to the table. The<br />

success <strong>of</strong> PSYOP depends in part on its ability to<br />

integrate with the intelligence community and this<br />

integration depends primarily on good leaders who<br />

recognize the necessity and are diplomatic enough<br />

to integrate and move forward.<br />

Educating the Support<br />

<strong>Intelligence</strong> analysts at the lowest level <strong>of</strong> PSYOP<br />

units are a legitimate and necessary asset. PSYOP<br />

specialists are effects-based and really no different<br />

than maneuver in terms <strong>of</strong> their support needs.<br />

They do not have the time to read every situation report,<br />

track trends, gather imagery and conduct pattern<br />

analysis. At the very least, intelligence analysts<br />

free up PSYOP specialists to plan and operate. For<br />

far too long PSYOP specialists have been forced to do<br />

their own intelligence analyses in addition to the already<br />

demanding target audience analyses. There is<br />

much value added in cross training Soldiers but MI<br />

pr<strong>of</strong>essionals will not get better at analysis by conducting<br />

operations and operators will not get better<br />

at executing by doing analysis. <strong>Intelligence</strong> support<br />

to PSYOP is unique but it is still by definition a support<br />

element and for the sake <strong>of</strong> providing world<br />

class PSYOP should be trained on all facets <strong>of</strong> IO.<br />

The disconnect here is <strong>of</strong>ten in defining needs<br />

and requirements from top down. For example,<br />

when TPTs need special equipment they request it<br />

through their headquarters element, which in turn<br />

tasks supply. It is not up to the supply sergeant to<br />

anticipate a special need any more than it is up to an<br />

intelligence analyst to tell the commander what information<br />

needs his operators will have. Doctrinally<br />

speaking, intelligence drives maneuver and the commander<br />

drives intelligence. This type <strong>of</strong> guidance is<br />

traditionally generated through priority intelligence<br />

requirements and information requirements but it<br />

can be done in any capacity that defines and artic-<br />

ulates the commander’s objectives. Analysts need<br />

to be given areas <strong>of</strong> focus, especially when dealing<br />

with a theater <strong>of</strong> operation as complex as Iraq or<br />

Afghanistan. The real danger in not giving adequate<br />

guidance regarding information needs is unnecessarily<br />

risking lives <strong>of</strong> Soldiers in TPTs to disseminate<br />

ineffective or even inaccurate products.<br />

A Product Development Detachment packages products for a<br />

leaflet drop.<br />

The Code<br />

Essentially intelligence support to PSYOP provides<br />

the tools, in the form <strong>of</strong> information, necessary to understand<br />

and eventually influence behavior. Cracking<br />

the code on intelligence support to PSYOP cannot be<br />

done in one rotation but that is not to discredit the<br />

aggressive efforts that are underway to integrate, educate<br />

and ultimately improve the support. A crucial<br />

part <strong>of</strong> this solution is getting intelligence analysts integrated<br />

with the PSYOP process and the evidence <strong>of</strong><br />

this is the 4 th PSYOP Group’s ability to provide trained<br />

analysts with a broad, and when necessary, in-depth<br />

understanding <strong>of</strong> IO in terms <strong>of</strong> function, capability<br />

and application. The more each branch understands<br />

the intricate details <strong>of</strong> the other, the more likely they<br />

are to maintain successful longevity in meeting worldwide<br />

missions. Long term success for both elements<br />

is interdependent–support to PSYOP is not a success<br />

until PSYOP leaders wouldn’t conceive <strong>of</strong> going to the<br />

planning table without all resources available to them,<br />

and this includes intelligence assets.<br />

First Lieutenant Katie Winwood currently serves as the 9 th<br />

PSYOP Battalion (A) S2. She deployed with D/9 th PSYOP<br />

Battalion as the Company <strong>Intelligence</strong> Officer attached to<br />

the 5 th Special Forces Group in support <strong>of</strong> CJSOTF-AP, OIF<br />

IV. Lieutenant Winwood graduated from Liberty University<br />

with a BA in Government and was commissioned out <strong>of</strong> the<br />

University <strong>of</strong> Virginia in 2006.<br />

April - June 2009 15


y Lieutenant Colonel William G. McDonough and Lieutenant Colonel John A. Conway<br />

Introduction<br />

The most fundamental change within Army intelligence<br />

transformation is an effort to change the behavior<br />

and expectations <strong>of</strong> intelligence producers<br />

and consumers. The Army leadership views this as<br />

an essential step toward changing organizational<br />

and operational culture. <strong>Intelligence</strong> producers will<br />

transition from a current requirements orientation to<br />

an anticipatory approach while consumers shift their<br />

mindset from one <strong>of</strong> fighting with knowledge to one<br />

<strong>of</strong> fighting for knowledge. This new mindset views<br />

every soldier as a collector and as an analyst. 1<br />

The <strong>Military</strong> <strong>Intelligence</strong> (MI) Corps exists to provide<br />

commanders at all levels intelligence analysis<br />

to support decision making for planning and execution,<br />

assist in understanding the adversary, and<br />

define the operational environment. Since we will<br />

never have sufficient intelligence collection assets or<br />

analysts to produce all the intelligence a commander<br />

may want, priority intelligence requirements (PIRs)<br />

help focus collection and analytical production on<br />

select intelligence requirements. However, many <strong>of</strong><br />

today’s U.S. Army operational commanders 2 and<br />

key staff <strong>of</strong>ficers simply do not understand or are<br />

not aware <strong>of</strong> doctrinal changes and the increased<br />

extent <strong>of</strong> what PIRs are supposed to do for the commander.<br />

There are three primary reasons for this<br />

misunderstanding or lack <strong>of</strong> awareness.<br />

First, and most importantly, this misunderstanding<br />

is directly tied to our warfighting culture reflected<br />

through our operation’s doctrine since the<br />

mid-1970s. Doctrine, <strong>of</strong> course, provides a common<br />

frame <strong>of</strong> reference as a guide to action and is not a<br />

strict or inflexible set <strong>of</strong> rules. Army operations’ doctrine<br />

has shaped how we fight, plan, and interpret<br />

how all warfighting functions support operations.<br />

For the past three decades, this context shaped the<br />

culture, focus, and viewpoints that today’s senior<br />

field grade and general <strong>of</strong>ficers use to make deci-<br />

sions as well as establish processes to assist in their<br />

decision making.<br />

Second, Army Transformation has further complicated<br />

the issue. Prior to transformation, division and<br />

corps commanders could assist ground commanders<br />

primarily in the form <strong>of</strong> increased logistics, deep<br />

attack aviation or artillery, or more intelligence assets.<br />

Today, brigade commanders have capabilities<br />

once reserved for division commanders. Resultantly,<br />

brigade commanders have increased responsibility<br />

and capacity thus increasing the potential for decisions<br />

they have to make. Corps and division commanders<br />

have fewer or different decisions to make,<br />

especially in decentralized counterinsurgency (COIN)<br />

operations. Finally, while there are similarities in PIRs<br />

for conventional (<strong>of</strong>fensive and defensive) operations,<br />

there are differences for unconventional type conflicts<br />

(stability or civil support) such as COIN or Foreign<br />

Internal Defense.<br />

Operations and <strong>Intelligence</strong>–The<br />

Inseparable Link<br />

Before addressing PIRs, we must discuss the inseparable<br />

link between operations and intelligence.<br />

Specifically, we will highlight the evolution <strong>of</strong> Army<br />

operations’ doctrine since this is the driver <strong>of</strong> all<br />

other warfighting functions’ support. This doctrine<br />

shaped today’s senior leaders, our training centers<br />

and programs, and our planning and execution for<br />

operations. Since the 1970s, operations’ doctrine<br />

was predominantly tactically and <strong>of</strong>fensively focused<br />

against a Soviet threat. Competing with this<br />

doctrine was the reality <strong>of</strong> world conditions, most<br />

notably the threat and collapse <strong>of</strong> the Soviet Union,<br />

and emerging military, information, and intelligence<br />

capabilities and our ability to exploit them.<br />

After the Vietnam War, the Army rebuilt itself and<br />

largely forgot about its operations during Vietnam.<br />

While it rebuilt itself, the traditional Soviet threat<br />

in Europe regained its preeminence in our world<br />

16 <strong>Military</strong> <strong>Intelligence</strong>


view. Directly related to this was the realization<br />

during the 1973 Yom Kippur War that the conventional<br />

battlefield had become more lethal. As a result,<br />

the 1976 Field Manual (FM) 100-5 Operations<br />

envisioned an active defense in Europe against numerically<br />

superior Soviet military forces. This prescriptive<br />

and tactical manual focused on firepower<br />

more than maneuver and fixated on fighting and<br />

winning the first battle. 3<br />

In 1982, the Army released an updated version<br />

focused on the <strong>of</strong>fense. Known as Airland Battle,<br />

the manual focused on conventional <strong>of</strong>fensive operations<br />

to fight outnumbered and win. The main<br />

threat was still the Soviet Union in Europe. The<br />

manual introduced the four tenets <strong>of</strong> Airland Battle:<br />

initiative, agility, depth, and synchronization, as<br />

well as the operational level <strong>of</strong> war and the linking<br />

<strong>of</strong> the strategic to the tactical. 4 A legacy <strong>of</strong> the synchronization<br />

<strong>of</strong> operations and all other warfighting<br />

functions, while well intentioned and necessary,<br />

was an emphasis to synchronize finite assets over<br />

time and space for Airland Battle. This became increasingly<br />

more restrictive and, arguably, counterproductive<br />

in later years despite updated concepts<br />

<strong>of</strong> Army operations.<br />

The 1986 version <strong>of</strong> FM 100-5 moved beyond<br />

Europe and recognized unconventional, low intensity<br />

conflicts and light infantry divisions. It was also more<br />

general and theoretical which allowed flexibility for<br />

commanders. 5 However, it was still tied to the concept<br />

<strong>of</strong> Airland Battle, especially conventional <strong>of</strong>fensive<br />

operations and the desire for synchronization.<br />

In 1993, recognizing the world had changed after<br />

the Soviet Union’s collapse, the Army published<br />

a new FM 100-5. The manual was largely influenced<br />

by operations in Panama and Kuwait as well<br />

as emerging technologies. The manual emphasized<br />

depth and simultaneous attack in order to bring<br />

about a quick resolution. 6 Synchronization <strong>of</strong> the<br />

multiple lines <strong>of</strong> operations or effort was a critical<br />

component. The manual placed more emphasis on<br />

unconventional, low intensity conflicts and conflict<br />

termination; a conspicuous change from the 1976,<br />

1982, and 1986 manuals. However, the new FM<br />

lightly addressed these issues with the substance<br />

<strong>of</strong> those types <strong>of</strong> operations covered in other doctrinal<br />

publications. Conventional <strong>of</strong>fensive operations<br />

remained the Army’s doctrinal focus. The stunning<br />

application <strong>of</strong> this doctrine during Operation Desert<br />

Storm not only validated the Army’s conventional<br />

<strong>of</strong>fensive focus but solidified its primacy and focus<br />

throughout the Army.<br />

The 1998 version <strong>of</strong> FM 100-5 provided balance<br />

between <strong>of</strong>fensive and defensive operations, simultaneous<br />

and sequential operations, and emphasized<br />

joint operations. It also folded the concepts <strong>of</strong><br />

unconventional and conventional warfare into this<br />

manual. Prior to this manual, a generation <strong>of</strong> Army<br />

leaders grew up learning <strong>of</strong>fensive operations in a<br />

conventional warfare context. This type <strong>of</strong> warfare<br />

lends itself to decisions and decision points on a<br />

battlefield where battalion through corps level commanders<br />

have to make decisions such as when to<br />

commit a reserve, conduct a deep attack, shift the<br />

main effort, etc. along a linear battlefield.<br />

In 2001, the Army published FM 3-0 (previously<br />

numbered as 100-5) Operations. It clearly defined<br />

operations in a more holistic manner–<strong>of</strong>fense, defense,<br />

stability, and support operations. Despite<br />

this more encompassing approach, like the previous<br />

versions <strong>of</strong> FM 100-5, the Army focused on<br />

defensive operations just long enough to generate<br />

enough combat power to reinitiate <strong>of</strong>fensive operations.<br />

This permeated the construct <strong>of</strong> our National<br />

Training Center (NTC) and mission readiness exercises<br />

(MREs) in the 1980s and 1990s. It has<br />

taken the reality <strong>of</strong> the past seven years to finally<br />

acknowledge and provide equal weight to stability<br />

and support operations; operations that were marginalized<br />

as late as 2003 in our training centers<br />

and MREs.<br />

In February 2008, the Army produced the latest<br />

FM 3-0. The manual clearly acknowledges a holistic<br />

and complex operational environment; one that<br />

is multidimensional and increasingly fought among<br />

the population. This doctrine acknowledges an “operational<br />

concept where commanders employ <strong>of</strong>fensive,<br />

defensive, and stability or civil support<br />

operations simultaneously as part <strong>of</strong> an interdependent<br />

joint force to seize, retain, and exploit the<br />

initiative, accepting prudent risk to create opportunities<br />

to achieve decisive results.” 7<br />

Army operations doctrine has changed from a singular<br />

focus on conventional <strong>of</strong>fensive operations to<br />

a more holistic and inclusive recognition <strong>of</strong> <strong>of</strong>fensive,<br />

defensive, and stability operations. PIRs have<br />

also changed in recognition <strong>of</strong> today’s more complex<br />

environment.<br />

April - June 2009 17


Evolution <strong>of</strong> PIR<br />

Today’s senior Army leaders have spent the preponderance<br />

<strong>of</strong> their military careers serving in an<br />

army equipped, trained, led, and educated to defeat<br />

a nation-state peer-competitor….The <strong>of</strong>ficer<br />

pr<strong>of</strong>essional development career path designed to<br />

defeat this threat is a rigid path that has evolved<br />

into a “best answer” process….The Army teaches<br />

its leaders from day one that there are almost always<br />

proven sequences <strong>of</strong> events that, if followed,<br />

will lead to the desired outcome. Facing a templatable<br />

enemy like our Cold War adversaries, adherence<br />

to Army Doctrine became the glide path into<br />

“how to think” and “what to do”….this approach<br />

has resulted in the development <strong>of</strong> narrow, sometimes<br />

inflexible leadership qualities and decision<br />

making processes that are not necessarily suited<br />

for today’s contemporary operating environment.<br />

Army leaders have been quite successful…putting<br />

conventional warfighting and leadership skills into<br />

a “black or white” category. The challenge faced today<br />

and in the future is reassessing and reorganizing<br />

these skills to operate just as effectively and<br />

efficiently in the ever-growing “gray” world. 8<br />

For three decades, the Army focused on conventional,<br />

<strong>of</strong>fensive operations while ignoring or shortchanging<br />

other operations. This is not a critique <strong>of</strong><br />

that focus given the strategic problems facing our<br />

nation and the Army’s answer to meet that challenge.<br />

It is simply to highlight the cultural environment<br />

that today’s senior <strong>of</strong>ficers grew up in during<br />

their formative years coming up through the ranks.<br />

Before 1990, the Army had eleven mechanized,<br />

one airborne, one air assault, one motorized, and<br />

four light active duty divisions. After the drawdown<br />

in the 1990s, the Army possessed six mechanized,<br />

one airborne, one air assault, and two<br />

light active duty divisions. Mechanized units are<br />

ideal for fighting a peer competitor such as the<br />

Soviet Union. The preponderance <strong>of</strong> today’s senior<br />

<strong>of</strong>ficers were influenced in some fashion by conventional,<br />

<strong>of</strong>fense oriented training and doctrine.<br />

The Army’s training centers and exercise events<br />

reinforced our predilection to make decisions in<br />

order to take action.<br />

Since the opening <strong>of</strong> the NTC in 1981, most “<strong>of</strong><br />

America’s top Army generals carry with them the<br />

almost-war stories <strong>of</strong> their trips to Fort Irwin.” 9<br />

Until fairly recently, the NTC focused on conven-<br />

tional force-on-force exercises with little attention<br />

paid to other types <strong>of</strong> operations. Additionally, our<br />

training centers and MREs are designed to force<br />

battalion through corps level commanders and<br />

staffs to plan and make decisions in a very compressed<br />

time frame in order to meet multiple training<br />

objectives. This in turn reinforces our cultural<br />

tendency to want to “do something” or make a decision<br />

as opposed to demonstrating patience and<br />

realize that a decision or action may not have to<br />

be made.<br />

The training center exception is arguably the<br />

Joint Readiness Training Center. It was designed<br />

for light infantry, airborne, and special operations<br />

forces as a light infantry equivalent <strong>of</strong> the NTC. A<br />

typical pre-9/11 training scenario consisted <strong>of</strong> an insertion<br />

and counterinsurgency operation; a defense<br />

(in response to a fictitious enemy attack), and culminated<br />

with an attack into a <strong>Military</strong> Operations in<br />

Urban Terrain complex. However, units still planned<br />

and made decisions in a very compressed time frame<br />

in order to meet multiple training objectives.<br />

On a final note, division and corps commanders<br />

are typically infantry <strong>of</strong>ficers; they grew up in the<br />

Army inculcated in our <strong>of</strong>fensive, tactically focused<br />

doctrine. A majority <strong>of</strong> division and corps level staff<br />

<strong>of</strong>ficers typically have only served at the battalion<br />

or brigade level in staff and/or command positions<br />

prior to serving on a higher staff. Since we are all<br />

victims <strong>of</strong> our past experiences, we are comfortable<br />

using methods that have worked in the past in new<br />

positions. This becomes important when related to<br />

PIR development.<br />

The 1994 FM 34-2 Collection Management and<br />

Synchronization Planning collection management<br />

doctrine is nested in the conventionally focused operations<br />

doctrine <strong>of</strong> the past. FM 34-2 recommended<br />

that intelligence <strong>of</strong>ficers and commanders should<br />

refine PIRs to specific questions that are linked<br />

to operational decisions. 10 Additionally, Collection<br />

Managers usually developed specific information<br />

requirements for both PIRs and intelligence requirements<br />

(IRs) to “complete the collection strategy by<br />

associating each requirement and its corresponding<br />

decision points and timelines.” 11 This inference<br />

linked PIRs, already linked to decisions, to arguably<br />

more constricted decision points.<br />

However, in 2004, the definition <strong>of</strong> PIRs became<br />

less constrained. FM 2-0 <strong>Intelligence</strong>, expanded the<br />

18 <strong>Military</strong> <strong>Intelligence</strong>


definition <strong>of</strong> PIRs by stating that answers “to the<br />

PIRs help produce intelligence essential to the commander’s<br />

situational understanding and decisionmaking<br />

[emphasis added].” 12<br />

The new February 2008 FM 3-0 further loosened<br />

the confines <strong>of</strong> PIRs solely being tied to <strong>of</strong>fensive<br />

focused decisions and decision points and related<br />

them to the more inclusive definition <strong>of</strong> operations<br />

(<strong>of</strong>fense, defense, and stability). PIRs, along with<br />

friendly force information requirements (FFIR),<br />

are part <strong>of</strong> what are known as commander’s critical<br />

information requirements (CCIRs). CCIRs are<br />

information requirements identified as critical to<br />

facilitate timely decisionmaking. CCIRs directly influence<br />

decisionmaking and facilitate the successful<br />

execution <strong>of</strong> military operations; they may support<br />

one or more decisions. 13 FM 3-0 states that a PIR<br />

“is an intelligence requirement, stated as a priority<br />

for intelligence support, that the commander and<br />

staff need to understand the adversary or the operational<br />

environment….PIRs identify the information<br />

about the enemy, terrain and weather, and civil<br />

considerations that the commander considers most<br />

important.” 14<br />

Finally, the just released 2008 FMI 2-01<br />

(the replacement for the 1994 FM 34-2), ISR<br />

Synchronization, states that a PIR is “an intelligence<br />

requirement, stated as a priority for intelligence<br />

support, which the commander and staff<br />

need to understand the adversary or the operational<br />

environment.” 15<br />

Transformation<br />

As described above, a generation <strong>of</strong> Army operations’<br />

doctrine created a culture and leadership<br />

mindset that emphasized conventional <strong>of</strong>fensive operations,<br />

decisions to conduct an <strong>of</strong>fensive fight, and<br />

synchronization <strong>of</strong> all available warfighting capability<br />

towards that focus. Additionally, until the Army’s<br />

ongoing transformation efforts, the Army has been<br />

a division centric organization since World War I.<br />

Pre-transformation divisions were the largest tactical<br />

units considered to be a combined arms team,<br />

self sustaining, and capable <strong>of</strong> independent operations.<br />

Transformation has changed this paradigm<br />

with brigades now the emphasis. This has exacerbated<br />

the friction between senior leaders working or<br />

commanding at the division or corps level, educated<br />

in the culture <strong>of</strong> the past 25 years with less or different<br />

ability to influence the battle space, and trans-<br />

formed brigades who enjoy significant autonomy,<br />

more combat power, increased situational awareness,<br />

and larger battle space.<br />

Transformation restructuring resulted in an Army<br />

that is now brigade combat team (BCT) centric.<br />

Simplistically, capabilities once assigned to a division<br />

are now organic in a BCT, providing them with<br />

means to accomplish more tasks. For example, the<br />

division formerly had a military intelligence (MI)<br />

battalion with division level assets. Under transformation,<br />

this MI battalion no longer exists; many <strong>of</strong><br />

its assets are now organic to a BCT while the rest<br />

are obsolete and no longer in the Army inventory. 16<br />

This reduced a division’s traditional ability to shape<br />

the battle space for a brigade commander with additional<br />

intelligence collection.<br />

Additionally, transformation has expanded the<br />

battle space for BCTs and increased the length<br />

<strong>of</strong> the lines <strong>of</strong> communications laterally between<br />

units and vertically between command and support<br />

echelons. 17 The end result are BCTs that are<br />

the Army’s primary tactical formations and more<br />

autonomous than before; a significant friction<br />

point between BCTs and higher level organizations<br />

commanded by leaders whose formative years were<br />

shaped by the Army’s division centric and conventional<br />

<strong>of</strong>fensive operations culture. BCT commanders<br />

are largely no longer dependent on the division<br />

to provide resources. Technology has expanded a<br />

BCT commander’s ability to see the battle space<br />

and affect it with organic assets. Today, intelligence<br />

is distributed and managed in nearly a flattened<br />

network where all echelons receive the dissemination<br />

<strong>of</strong> intelligence at nearly the same time and<br />

share the same databases <strong>of</strong> information. There is<br />

no real stove-pipe or special highly classified intelligence<br />

that is not shared with all echelons. BCTs<br />

are no longer dependent on a division for “seeing<br />

over the next ridge” and for early warning <strong>of</strong> enemy<br />

intentions and actions. This creates some cognitive<br />

dissonance for senior <strong>of</strong>ficers at the division<br />

and corps level since this new dynamic is not what<br />

they grew up with in the 1980s and 1990s. The<br />

type, scope, and timeliness <strong>of</strong> decisions that both<br />

BCT and higher level commanders have to make<br />

have changed.<br />

Priority <strong>Intelligence</strong> Requirements<br />

In 2003, to meet the needs <strong>of</strong> Army Transformation,<br />

the Army G2 created TF Actionable <strong>Intelligence</strong><br />

April - June 2009 19


to change the way that MI would operate in the<br />

future. 18 One <strong>of</strong> the four Task Force Actionable<br />

<strong>Intelligence</strong> concepts was to change the culture<br />

and mindset <strong>of</strong> intelligence producers and consumers.<br />

19 To achieve this goal, the task force<br />

envisioned organizational, procedural, and technological<br />

changes to affect our culture in order<br />

to facilitate intelligence, information, and insights<br />

from all echelons. 20<br />

Part <strong>of</strong> this procedural change is to recognize that<br />

PIRs have changed as well as the types and timeliness<br />

<strong>of</strong> decisions that commanders have to make.<br />

PIRs help to provide commanders with an understanding<br />

<strong>of</strong> the operational environment which assists<br />

in planning and making decisions.<br />

PIR development involves not just anticipating<br />

what decisions a commander may have to make<br />

but also the relationships between friendly units;<br />

information systems; collection, processing, and<br />

dissemination systems; and the political, military,<br />

economic, social, infrastructure, information,<br />

physical environment, and time operational<br />

variables. Answers to PIRs (and FFIRs) help the<br />

commander visualize the operational environment.<br />

Crafting PIRs is important because every<br />

PIR costs time, resource allocation, and analytical<br />

effort.<br />

<strong>Intelligence</strong> <strong>of</strong>ficers validate and recommend<br />

PIRs. 21 Commanders approve IRs essential to mission<br />

accomplishment as PIRs, which form the basis<br />

for planning and executing operations. 22 Typically,<br />

PIRs are developed during MDMP and are reviewed<br />

and adjusted as conditions change, operations progress,<br />

or the PIR(s) are answered. Each set <strong>of</strong> PIRs<br />

is unique to the circumstances and context <strong>of</strong> the<br />

time. FM 5-0 and FMI 2-01 describe how PIRs are<br />

developed during MDMP. 23<br />

The following highlight the PIR guidelines [emphasis<br />

added] from 1994 to present.<br />

FM 34-2 (1994) 24 FM 34-8-2 (1998) 25<br />

They ask only one question. They ask only one question.<br />

They focus on a specific fact, event, or<br />

activity.<br />

They provide intelligence required to support<br />

a single decision.<br />

They focus on a specific fact, event, or<br />

activity.<br />

They provide intelligence required to support<br />

a single decision.<br />

PIR should be focused, specific, and directly They are tied to key decisions that the<br />

related to friendly decision expected to occur commander has to make.<br />

during COA execution.<br />

They give a latest time information is <strong>of</strong><br />

value (LTIOV).<br />

ST 2-50.4 (2001) 26 FMI 2-01 (2008) 27<br />

Do not give multiple questions in a single PIR Ask only one question.<br />

or you will not focus on your real requirement<br />

and may not satisfy your requirement.<br />

Base most <strong>of</strong> your PIR on a specific fact, They focus on a specific fact, event, or<br />

event, or activity that threat has or is known activity.<br />

to do (or specific to environment) but<br />

remember to consider how threat could<br />

suprise you (an atypical threat) - potentially<br />

one <strong>of</strong> their greatest advantages.<br />

PIR are listed and ranked in order from most They provide intelligence required to support<br />

to least important.<br />

a single planning task, decision, or action.<br />

Do not ask questions that have been<br />

They can be satisfied using available assets or<br />

answered.<br />

capabilities.<br />

The guidelines have changed little between 1994<br />

and the new FMI 2-01. However, there has been a<br />

subtle and nuanced expansion <strong>of</strong> PIRs supporting<br />

a single decision to supporting a single planning<br />

task, decision, or action. Another guideline is that<br />

FMI 2-01 states that PIR should be satisfied using<br />

available assets or capabilities. While this seems<br />

obvious, it usually inferred technical intelligence<br />

capabilities in the pre-Transformation Army. This<br />

is especially important for a division that no longer<br />

possesses any organic intelligence collection assets.<br />

A unit’s collection assets or capabilities are<br />

all its intelligence, surveillance, and reconnaissance<br />

(ISR) and non-ISR resources. All units and<br />

Soldiers are potential sources <strong>of</strong> relevant information<br />

to support the commander’s PIRs.<br />

PIRs today need to support those key IRs that<br />

a commander needs to achieve better overall situational<br />

understanding <strong>of</strong> his operational environment<br />

that he deems a priority for mission<br />

success. These priorities do not necessarily need<br />

to be linked directly to a commander’s decision;<br />

one PIR in fact may be linked to multiple decisions,<br />

actions, or future planning efforts. Also,<br />

PIRs must not be so restrictive that they force<br />

rigid and singular enemy/threat based collection<br />

requirements. Additionally, despite these guidelines,<br />

it is sometimes acceptable to ask more than<br />

one question. For example, if you want to know<br />

where an enemy force might attack, it is almost<br />

automatic to ask when they might attack. So, instead<br />

<strong>of</strong> writing two PIRs where the answers are<br />

interrelated, it should be acceptable to create a<br />

PIR such as “Where and when will Threat Group<br />

X attack U.S. forces in our operational environment?”<br />

Finally, PIRs can be solely about nonlethal<br />

aspects <strong>of</strong> the full spectrum <strong>of</strong> operations such<br />

as focusing on understanding the capacity <strong>of</strong> a<br />

community’s essential services it provides or the<br />

effectiveness <strong>of</strong> its local security forces and local<br />

governance.<br />

20 <strong>Military</strong> <strong>Intelligence</strong>


ISR assets include: infantry and armor scout platoons;<br />

cavalry units; battlefield surveillance brigades;<br />

all human intelligence; geospatial intelligence;<br />

signals intelligence; measurement and signature intelligence;<br />

counterintelligence assets; unmanned aerial<br />

system units; fires target acquisition sections;<br />

long-range surveillance units; chemical, biological,<br />

radiological, and nuclear squads; reconnaissance<br />

squadrons; and attack and/or reconnaissance aircraft.<br />

ISR capable units are units that do not have<br />

surveillance and/or reconnaissance as their primary<br />

mission but can be directed to perform ISR<br />

functions. The units include combat engineer battalions;<br />

engineer reconnaissance sections; infantry<br />

battalions; military police; and brigade combat<br />

teams. Other units that can collect and disseminate<br />

PIR information include unit leaders that meet with<br />

local leaders; civil affairs teams; and transportation<br />

or sustainment units.<br />

Since a unit’s collection assets or capabilities are<br />

all its ISR and non-ISR assets, the operations <strong>of</strong>ficer<br />

synchronizes intelligence collection throughout<br />

the organization. “The operations <strong>of</strong>ficer (in coordination<br />

with the intelligence <strong>of</strong>ficer and other staff<br />

members) tasks available ISR assets to best satisfy<br />

each requirement.” 28 PIRs are answered by multiple<br />

echelons <strong>of</strong> units and staff sections across a unit.<br />

The collection manager synchronizes intelligence<br />

collection assets and ensures, in conjunction with<br />

the operations <strong>of</strong>ficer, that other non intelligence<br />

collectors are worked into an overall synchronization<br />

plan.<br />

Irregular Warfare (COIN)<br />

The 2008 FM 3-0 states that a PIR is a requirement<br />

that the commander and staff need to understand<br />

the adversary or the operational environment and<br />

can identify information about the enemy, terrain<br />

and weather, and civil considerations. 29 All major operations<br />

combine <strong>of</strong>fensive, defensive, and stability<br />

elements. PIRs that support COIN operations are <strong>of</strong>ten<br />

different than conventional operations’ PIR. This<br />

is not to suggest that creating PIR for conventional<br />

<strong>of</strong>fensive and defensive operations is not difficult<br />

or complex. PIRs for these types <strong>of</strong> operations are<br />

simply understood better by our senior <strong>of</strong>ficers and<br />

are more <strong>of</strong>ten tied to decisions or situations they<br />

have been trained to make by the Army’s training<br />

and education centers before 9/11. Stability operations,<br />

particularly ones with an irregular war-<br />

fare (e.g., COIN) operational theme, differ distinctly<br />

from <strong>of</strong>fensive and defensive operations. 30<br />

Successful COIN operations rely heavily on good<br />

intelligence and a thorough understanding <strong>of</strong> the<br />

enemy. “Counterinsurgents have to understand that<br />

[every situation is different] in as nuanced a manner<br />

as possible, and then with that kind <strong>of</strong> understanding<br />

try to craft a comprehensive approach to<br />

the problems.” 31 Insurgencies are struggles for control<br />

over contested political space, between a state<br />

(or group <strong>of</strong> states or occupying powers), and one<br />

or more popularly based, non-state challengers. 32<br />

Insurgencies are fought in a complex environment<br />

consisting <strong>of</strong> government; physical terrain; information,<br />

propaganda, and the 24 hour news cycle; insurgent<br />

ideology; refugees, displaced persons, and<br />

mass migration; ethnic, tribal, clan or community<br />

groups; nongovernmental and private volunteer<br />

organizations; armed private contractors; porous<br />

borders; external funding; social classes; local and<br />

foreign armed groups; urban and rural populations;<br />

economic and political institutions; unemployment;<br />

crime; bandits; narcotics traffickers; smugglers;<br />

couriers; black marketers; and religious parties. 33<br />

Many independent and interlinked individuals and<br />

groups contribute to the complexity.<br />

Because COIN operations are dispersed, a counterinsurgent’s<br />

own actions are a key generator <strong>of</strong> intelligence.<br />

Operations produce intelligence that drives<br />

subsequent operations. 34 “Reporting by units, members<br />

<strong>of</strong> the country team, and associated civilian<br />

agencies is <strong>of</strong>ten <strong>of</strong> greater importance than reporting<br />

by specialized intelligence assets. These factors,<br />

along with the need to generate a favorable tempo<br />

(rate <strong>of</strong> military operations), drive the requirement to<br />

produce and disseminate intelligence at the lowest<br />

practical level.” 35 Collection with ISR and non-ISR<br />

assets occurs at all echelons. 36 Additionally, effective<br />

COIN operations are decentralized; local commanders<br />

have the best grasp <strong>of</strong> their situations. 37<br />

As previously discussed, it is important to observe<br />

the linkage between PIRs and collection management<br />

since PIRs should drive all future collection<br />

and analytical priorities. In today’s current COIN<br />

environments, divisions and corps are not maneuvering<br />

combat formations as in conventional “high<br />

intensity” <strong>of</strong>fensive or defensive operations. There<br />

are few, if any, decision points and immediate decisions<br />

a division or corps commander need to make.<br />

April - June 2009 21


Combat operations are executed in a decentralized<br />

manner by “empowered” BCTs who are responsible<br />

as the battle space owner for a defined area <strong>of</strong> operation.<br />

BCTs drive daily collection requirements<br />

based upon broadly defined guidance to include PIR<br />

and SIR and Commander’s Intent which is usually<br />

summarized in a written or verbal division fragmentary<br />

order to subordinate units. BCTs must translate<br />

this broad collection guidance and division ISR<br />

objectives and priorities into operational plans with<br />

clearly defined collection tasks and purposes.<br />

To ensure that intelligence collection is synchronized,<br />

the overall intelligence synchronization plan<br />

ensures that PIRs are nested at all echelons; they<br />

can be tailored to local or regional circumstances<br />

but tactical and operational collection efforts should<br />

support one another. Additionally, a headquarters<br />

monitors requests for information from lower echelons<br />

and taskings from higher which assists to validate<br />

the synchronization effort. Also, operational<br />

and some tactical ISR synchronization assists host<br />

nation, inter-agency, inter-service, and multinational<br />

efforts. These in turn can provide valuable information<br />

that assists in answering a unit’s PIR. 38<br />

Finally, because every Soldier is a potential collector,<br />

the intelligence synchronization plan addresses<br />

day to day tactical operations; every patrol or mission<br />

should be given intelligence collection requirements<br />

as well as operations requirements. 39<br />

Because COIN operations by their very nature are<br />

decentralized and lower level commanders have a<br />

better understanding <strong>of</strong> the operational environment,<br />

higher level commanders have different and,<br />

in many cases, less decisions to make. Directly related,<br />

transformation has removed the traditional<br />

tools <strong>of</strong> influence, particularly for division level commanders,<br />

altering or removing decisions that a pre-<br />

Transformation division commander may have had<br />

to make. Thus, the synchronization plan should be<br />

less restrictive and constraining the higher a headquarters<br />

given the fewer decisions required and/or<br />

the larger degree <strong>of</strong> time to decide. This facilitates<br />

the flexibility, nimbleness, and decentralization required<br />

during COIN operations.<br />

Conclusion<br />

PIRs are an important part <strong>of</strong> understanding the<br />

threat we face, the operational environment as a<br />

whole, and what decisions a commander may have<br />

to make. PIRs help commanders to both visual-<br />

ize the operational environment and facilitate both<br />

planning and decisionmaking. PIRs have changed<br />

and are no longer rigid and inflexible with the intent<br />

<strong>of</strong> providing answers to a checklist <strong>of</strong> questions.<br />

Operations and intelligence doctrine have<br />

evolved to fully appreciate the complexity <strong>of</strong> today’s<br />

battlefield. Today’s senior leaders and military intelligence<br />

pr<strong>of</strong>essionals must be educated on these<br />

changes.<br />

Today’s complex operational environment requires<br />

less prescriptive processes and thinking<br />

and more commanders’ coup d’oeil or intuition 40<br />

based on information, intelligence, and experience.<br />

As our doctrine has evolved along with our<br />

strategic requirements, our processes for asking<br />

the right questions have changed. Senior field<br />

grade and general <strong>of</strong>ficers today must have the<br />

mental agility to acknowledge that the processes<br />

and doctrine <strong>of</strong> the 1980s and 1990s do not meet<br />

all challenges we face today. Simply put, all operations<br />

are contextually and operationally dependent;<br />

PIRs based on conventional <strong>of</strong>fensive or<br />

defensive operations differ from COIN. Also, transformation<br />

has changed the methods and scope <strong>of</strong><br />

influencing the battle space. BCTs today have as<br />

much combat power, technology, and situational<br />

awareness as divisions <strong>of</strong> the past. Brigade and<br />

lower and division and higher commander’s roles<br />

have changed and with it, the type <strong>of</strong> intelligence<br />

required and the type and timeliness <strong>of</strong> decisions<br />

these commanders have to make. Today’s commanders<br />

must put away their antiquated understanding<br />

<strong>of</strong> PIRs they grew up with during their<br />

formative years and recognize that PIRs will vary<br />

for <strong>of</strong>fensive, defensive, and stability operations<br />

and are not solely tied to immediate decisions or<br />

decision points.<br />

Endnotes<br />

1. Major Frank A. Smith, “<strong>Intelligence</strong> Transformation: Using Threat<br />

Characteristics to Define Division Capabilities” (Fort Leavenworth,<br />

Kansas: Command and General Staff College, 25 May 2006), 56, at<br />

http:// www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA450630&Location<br />

=U2&doc= GetTRDoc.pdf.<br />

2. For the purposes <strong>of</strong> this article, operational commanders refer<br />

to tactical BCT, division, and corps Commanders, and the G3,<br />

Chief <strong>of</strong> Staff, and Assistant Commanders in divisions and corps<br />

organizations; <strong>of</strong>ficers primarily from the Infantry but also from the<br />

Armor, Artillery, and Aviation branches. These are the key leaders<br />

leading transformed BCTs and today’s tactical and operational<br />

organizations or running the staffs <strong>of</strong> these organizations.<br />

22 <strong>Military</strong> <strong>Intelligence</strong>


3. David Jablonsky, “US <strong>Military</strong> Doctrine and the Revolution in<br />

<strong>Military</strong> Affairs”, Parameters, Autumn 1994, 21-22 at http://www.<br />

carlisle.army.mil/usawc/parameters/1994/jablonsk.htm.<br />

4. FM 100-5, Operations, 20 August 1982, 8-4.<br />

5. FM 100-5, Operations, 5 May 1986, i.<br />

6. John L. Romjue, <strong>American</strong> Army Doctrine for the Post-Cold<br />

War (Fort Monroe, Virginia: TRADOC Historical Monograph<br />

Services, 1996), 132 at http://www.dtic.mil/cgi-bin/<br />

GetTRDoc?AD=ADA317654&Location= U2&doc=GetTRDoc.pdf.<br />

7. FM 3-0, Operations, 27 February 2008, Forward, at http://www.<br />

dtic.mil/doctrine/jel/service_pubs/fm3_0a.pdf.<br />

8. Lieutenant Colonel Joseph P. DeAntona, “Transforming the<br />

Operational Career Field Officer Path: Preparing Leaders for Today’s<br />

Contemporary Operating Environment and to Lead the Army into<br />

the 21st Century” (Carlisle Barracks, Pennsylvania: U.S. Army War<br />

College, 18 March 2005), 2 at http://www.strategicstudies institute.<br />

army.mil/pdffiles/ksil29.pdf.<br />

9. Julian E. Barnes, “Hard-Learned Lessons”, U.S. News & World<br />

Report, 19 March 2006 at http://www.usnews.com/usnews/news/<br />

articles/060327/27military.htm.<br />

10. FM 34-2, Collection Management and Synchronization Planning,<br />

8 March 1994), 3-6 at http://www.fas.org/irp/doddir/army/<br />

fm34-2/toc.htm.<br />

11. Ibid., 3-14.<br />

12. FM 2-0, <strong>Intelligence</strong>, 17 May 2004, 1-11 at www.fas.org/irp/<br />

doddir/army/fm2-0.pdf.<br />

13. FM 3-0, 27 February 2008, 5-8.<br />

14. Ibid., 5-9.<br />

15. FMI 2-01, ISR Synchronisation, 1 November 2008, 1-6.<br />

16. Smith, 60.<br />

17. John J. Magrath, “An Army at War: Change in the Midst <strong>of</strong><br />

Conflict: The Proceedings <strong>of</strong> the Combat Studies Institute 2005<br />

<strong>Military</strong> History Symposium” (Fort Leavenworth, Kansas: Combat<br />

Studies Institute Press, 2-4 August 2005), 356 at http://www-cgsc.<br />

army.mil/carl/resources/csi/content.asp#army.<br />

18. Joe Burlas “Actionable <strong>Intelligence</strong> Relies on Every Soldier”,<br />

Army News Service, April 13, 2004 at http://www4.army.mil/ocpa/<br />

read.php?story_id_key=5847.<br />

19. Headquarters, Department <strong>of</strong> the Army, United States Army 2004<br />

Transformation Roadmap (Washington, D.C.: Army Transformation<br />

Office, July 2004), 5-15 at http://www.dtic.mil/futurejointwarfare/<br />

strategic/army_trans_roadmap.pdf.<br />

20. Ibid.<br />

21. FM 34-2, D-1; FMI 2-01, 1-12; FM 3-0, 27 February 2008, 5-9.<br />

22. FM 34-2, 3-7; FMI 2-01, 2-4.<br />

23. FM 5-0, Army Planning and Orders Production, 20 January<br />

2005, Chapter 3, and FMI 2-01, Chapter 1.<br />

24. FM 34-2, D1 to D2.<br />

25. FM 34-8-2, <strong>Intelligence</strong> Officer’s Handbook, 1 May 1998, D-2 at<br />

http://www.fas.org/irp/doddir/army/fm34-8-2.pdf.<br />

26. ST 2-50.4 (FM 34-8), Combat Commanders Handbook on<br />

<strong>Intelligence</strong> (Fort Huachuca, AZ: United States Army <strong>Intelligence</strong><br />

Center and Fort Huachuca, AZ, 6 September 2001), B-2. https://<br />

rdl.train.army. mil/soldierPortal/atia/adlsc/view/public/8684-1/<br />

st/2-50.4/st2-50.4.htm<br />

27. FMI 2-01, 2-5.<br />

28. Ibid., 4-2.<br />

29. FM 3-0, 27 February 2008, 5-9.<br />

30. Ibid., 2-3 to 2-4.<br />

31. Carlotta Gall, “Insurgents in Afghanistan Are Gaining,<br />

Petraeus Says”, The New York Times, 30 September 2008 at<br />

http://www.nytimes.com/2008/10/01/world/asia/01petraeus.<br />

html?partner=rssnyt&emc =rss.<br />

32. Dr. David J. Kilcullen, “Three Pillars <strong>of</strong> Counterinsurgency:<br />

Remarks Delivered at the U.S. Government Counterinsurgency<br />

Conference”, Washington D.C., 28 September 2006 at www.au.af.<br />

mil/au/awc/awcgate/ uscoin/3pillars_<strong>of</strong>_counterinsurgency.pdf.<br />

33. FM 3-24, Counterinsurgency, 15 December 2006, 3-3 to 3-4,<br />

3-13 at https://rdl.train.army.mil/soldierPortal/atia/adlsc/view/<br />

public/23285-1/FM/3-24/FM3_24.PDF.<br />

34. Ibid,, 3-1.<br />

35. Ibid., 1-23.<br />

36. Ibid., 3-24.<br />

37. Ibid., 1-26.<br />

38. Ibid., 3-25.<br />

39. FM 3-24, 3-27.<br />

40. Carl von Clausewitz, On War. Edited and translated by Michael<br />

Howard and Peter Paret (Princeton, New Jersey: Princeton University<br />

Press, 1976), 112.<br />

Lieutenant Colonel William G. McDonough, U.S. Army, has<br />

served for the past 25 years in a variety <strong>of</strong> assignments<br />

from the platoon to corps level as an Infantry and MI<br />

Soldier to include deployments in support <strong>of</strong> Operations<br />

Hurricane Andrew, Restore Hope, Uphold Democracy,<br />

Joint Endeavor, and Enduring Freedom IV and VII. He is<br />

currently the G2 Analysis and Control Element Chief for<br />

the 10 th Mountain Division (LI) supporting Operation Iraqi<br />

Freedom VI. He holds a BA and MA in History from the<br />

California State University, Sacramento; an MS in <strong>Military</strong><br />

Operational Art and Science from the Air Command and<br />

Staff College; and a MS in Airpower Arts and Science from<br />

the School <strong>of</strong> Advanced Air and Space Studies.<br />

Lieutenant Colonel John A. (Jake) Conway, U.S. Army, has<br />

served for the past 20 years in a variety <strong>of</strong> artillery and<br />

military intelligence positions to include Infantry Battalion S2<br />

in support <strong>of</strong> Operation Uphold/Maintain Democracy and BCT<br />

S2 in support <strong>of</strong> Operation Iraqi Freedom IV. He is currently<br />

the G2 for the 10 th Mountain Division (LI) supporting Operation<br />

Iraqi Freedom VI. He holds a BA in Pre Law from Penn State<br />

University, an MA in Management from Webster University,<br />

St. Louis, Missouri, and is a graduate <strong>of</strong> the Post-Graduate<br />

<strong>Intelligence</strong> Program, Washington D.C.<br />

April - June 2009 23


y Chaplain (Lieutenant Colonel) Kenneth Lawson<br />

Introduction<br />

Army chaplains and chaplain assistants serving in Afghanistan have numerous opportunities to interact<br />

with local Muslim clergy. The mullah, or religious leader, <strong>of</strong> a village is a vital element <strong>of</strong> village political,<br />

religious, and cultural life. Many chaplains reach out to mullahs as points <strong>of</strong> contact for humanitarian<br />

activities (donating school supplies; rebuilding orphanages; distributing gifts and candy to Afghan children<br />

in hospital) conducted by U.S. Soldiers. With the permission <strong>of</strong> unit commanders, chaplains frequently<br />

engage in these humanitarian missions.<br />

A potential controversy exists when a chaplain is asked for specific information from commanders or intelligence<br />

<strong>of</strong>ficers related to his interaction with local mullahs. Chaplains, as doctrinal non-combatants,<br />

could be placed in the awkward position <strong>of</strong> providing targeting information to commanders, a combatant<br />

task. In order to examine the doctrinal tension between chaplains and Information Operations (IO), we will<br />

first review the roles and responsibilities <strong>of</strong> Army chaplains. Next we will examine the components and<br />

capabilities <strong>of</strong> IO. Finally, a discussion <strong>of</strong> chaplains’ experiences in Afghanistan related to mullah engagements<br />

(religious leader liaison) and IO will illustrate the tensions in this fragile relationship with suggestions<br />

for success for the overall mission <strong>of</strong> the commander.<br />

Doctrinal Guidelines<br />

The two guiding Army documents that articulate the roles and responsibilities <strong>of</strong> chaplains are Field<br />

Manual (FM) 1-05, Religious Support, and Army Regulation (AR) 165-1, Chaplain Activities in the United<br />

States Army. The First Amendment <strong>of</strong> the U.S. Constitution, reinforced by Title 10 <strong>of</strong> the U.S. Code, guarantees<br />

every <strong>American</strong> the right to the free exercise <strong>of</strong> religion. <strong>American</strong>s in the military enjoy this right as<br />

well as civilians. Commanders are responsible for insuring the religious freedoms <strong>of</strong> their troops through<br />

the chaplain as a staff <strong>of</strong>ficer. FM 1-05 states:<br />

The mission <strong>of</strong> the Unit Ministry Team (UMT) is to provide and perform religious support to soldiers, families, and<br />

authorized civilians as directed by the commander. Chaplains serve as personal staff <strong>of</strong>ficers to commanders at<br />

all levels <strong>of</strong> the command providing essential information on troop and unit morale, quality <strong>of</strong> life matters, free<br />

exercise <strong>of</strong> religion issues, ethical decision making, and the impact <strong>of</strong> religion on the operation. 1<br />

The religious support activities <strong>of</strong> chaplains are widely known. They consist <strong>of</strong> religious services, counseling,<br />

religious education, advisor to the commander and staff, and other activities, including coordinating<br />

“religious/humanitarian support.” The FM states that such support includes humanitarian support<br />

programs on issues <strong>of</strong> religion, morale, morals, and ethics.” 2 The chaplain, by doctrine, then is to assist<br />

24 <strong>Military</strong> <strong>Intelligence</strong>


the commander with religious/humanitarian support. Chaplains are also, by regulation, to “provide liaison<br />

to indigenous religious leaders in close coordination with the G5.” 3 Additionally, chaplains coordinate<br />

with elements <strong>of</strong> the G9 (Civil Affairs) in religious liaison/mullah engagements. 4<br />

Information Operations<br />

Based primarily on advanced technology, IO is an element <strong>of</strong> combat power. It encompasses attacking<br />

adversary command and control (C2) systems while protecting friendly C2 from adversary disruption.<br />

Thus IO has both <strong>of</strong>fensive and defensive capabilities. The goal <strong>of</strong> IO is to produce information<br />

superiority over the enemy at decisive points. Commanders conduct IO to apply combat power to<br />

achieve information superiority on the battlefield. Enemy intelligence, surveillance, reconnaissance<br />

(ISR), and targeting are all part <strong>of</strong> IO. Offensive IO seeks to destroy, degrade, disrupt, deny, deceive,<br />

and exploit enemy forces. A high value target <strong>of</strong> IO is enemy center <strong>of</strong> gravity, typically communication<br />

and headquarters locations, to target enemy decision makers and information systems.<br />

IO maximizes the use <strong>of</strong> technology to shape the combat power <strong>of</strong> friendly forces. In FM 3-13, Information<br />

Operations, the following summary <strong>of</strong> IO is provided:<br />

“Commanders conduct (plan, prepare, execute, and assess) IO to apply the information element <strong>of</strong> combat<br />

power. Combined with information management and ISR operations; effective IO results in gaining and<br />

maintaining information superiority. Information superiority creates conditions that allow commanders to<br />

shape the operational environment and enhance the effects <strong>of</strong> all elements <strong>of</strong> combat power. IO has two<br />

categories, <strong>of</strong>fensive IO and defensive IO. Commanders conduct IO by synchronizing IO elements and related<br />

activities, each <strong>of</strong> which may be used either <strong>of</strong>fensively or defensively.”<br />

“IO brings together several previously separate functions as IO elements and related activities. To provide unity<br />

<strong>of</strong> effort, IO is placed under a special staff <strong>of</strong>ficer, the assistant chief <strong>of</strong> staff G7. The G7 has coordinating<br />

staff responsibility for IO. He does this by means <strong>of</strong> the G7 section and IO cell. Placing responsibility for<br />

synchronizing the activities <strong>of</strong> the IO elements and related activities on one special staff <strong>of</strong>ficer helps<br />

commanders mass their effects to gain and maintain information superiority.” 5<br />

The Army chaplain is a noncombatant. As a religious leader and a staff <strong>of</strong>ficer, AR 165-1 states,<br />

“Chaplains are noncombatants and will not bear arms.” 6 This regulation is clear enough. The confusion<br />

relates to the idea <strong>of</strong> information as a weapon, and that a chaplain may receive information that IO personnel<br />

in the G2, G3, or G7 would like to use in <strong>of</strong>fensive action against enemy forces. There is no approved<br />

doctrinal standard for the role <strong>of</strong> the chaplain in IO. However, AR 165-1 does suggest possible<br />

roles <strong>of</strong> the chaplain. For example, it states that, “Commanders will detail or assign chaplains only to<br />

duties related to their pr<strong>of</strong>ession. Chaplains may perform unrelated duties in a temporary military emergency.”<br />

It also states that a commander will not detail a chaplain as an “information” <strong>of</strong>ficer. AR 165-1<br />

further states, “Commanders will not…require a chaplain to serve in a capacity in which he or she may<br />

later be called upon to reveal privileged or sensitive information incident to such service.” 7<br />

The Army chaplain will have some role in advising the commander on religious and cultural issues in<br />

the area <strong>of</strong> operations (AO). FM 1-05 states that the chaplain will provide “support to the commander<br />

on matters <strong>of</strong> religion, morals, and morale, as affected by religion and the impact <strong>of</strong> indigenous religions<br />

on the military mission.” 8 It further states that the chaplain will “provide liaison to indigenous religious<br />

leaders in close coordination with the G5/S5.” 9 The question remains: “At what point does a chaplain as<br />

a religious advisor to the commander cross the line and partake <strong>of</strong> combatant activities in IO?”<br />

Army chaplains concerned about their involvement with IO are on safe ground when they concentrate<br />

their efforts primarily on providing religious support to soldiers. Religious support includes religious services,<br />

rites, sacraments, ordinances, pastoral care and counseling, religious education, and humanitarian<br />

support. As a staff <strong>of</strong>ficer, the chaplain supports the commander and staff, administrates, and acts<br />

as an advisor to the command on indigenous religions. 10 As one chaplain stated, “It is conceivable to witness<br />

commanders demanding that chaplains provide information advantageous to U.S. forces that may<br />

April - June 2009 25


A mullah engagement in October 2003 sponsored by the CJTF-<br />

180. This religious liaison was hosted by CH (LTC) Ken Sampson,<br />

back row, far left. Photo by MSG Bruce Snowdeal.<br />

be gleaned from a liaison and contact with local religious<br />

leaders. One would be naïve to think that the<br />

chaplaincy would be exempt from the pressure <strong>of</strong> a<br />

well-meaning but ill-advised commander.” 11 The focus<br />

<strong>of</strong> chaplain ministries must first be on religious<br />

support to the soldiers within the unit and not on<br />

humanitarian missions to indigenous peoples.<br />

The expanding role <strong>of</strong> religion in contemporary<br />

operations will increase the requests for religious<br />

advice on local populations. The senior chaplain<br />

should be a subject matter expert in this area, a key<br />

point <strong>of</strong> contact in advising the commander. When<br />

the opportunity arises to perform a religious liaison<br />

with local clergy, such as the mullah engagements<br />

in Afghanistan, chaplains should follow the following<br />

guidelines:<br />

Ê A religious liaison mission must be endorsed by the commander.<br />

Ê The chaplain must staff his intentions with the G2, G3, G5 and G9 sections.<br />

Ê Only chaplains <strong>of</strong> field grade (Major) or higher should participate.<br />

Ê Emphasis should be on common humanitarian and religious concerns and not on political/military<br />

matters.<br />

Ê After the mission, chaplains are not to provide information related to targeting or <strong>of</strong>fensive operations<br />

to the command. Some non-lethal targeting information may be appropriately shared with the command,<br />

such as the location <strong>of</strong> schools, religious sites, and orphanages.<br />

In stability and support operations, chaplains will have an increasing role in engaging indigenous<br />

religious leaders to help facilitate the peace keeping and nation building missions <strong>of</strong> U.S. troops. This<br />

liaison role <strong>of</strong> Army chaplains with local clergy must be practiced with caution, as more and more<br />

demand on chaplain religious expertise will be requested by IO personnel. As one chaplain warned,<br />

“Caution must be applied to avoid the slippery slope <strong>of</strong> grasping for a deeper and inappropriate role.<br />

With an increasing command emphasis on IO, the [Chaplain] Corps must guard against justifying its<br />

value in its role in IO.” 12 The role <strong>of</strong> a chaplain is justified as a provider <strong>of</strong> religious support to all soldiers,<br />

not as a tool <strong>of</strong> IO to coerce intelligence from indigenous clergy.<br />

The Role <strong>of</strong> Religion in IO<br />

In Operation Enduring Freedom, religious issues weighed heavily in the commander’s decision making<br />

process. Religion served as a source <strong>of</strong> information and as a type <strong>of</strong> information. As foreigners in a<br />

Muslim land, the sensitivity to religious issues for U.S. troops in Afghanistan was paramount. The customs<br />

and rituals <strong>of</strong> Islam are unknown to most <strong>American</strong>s, making it increasingly important for chaplains<br />

to advise commanders and soldiers on the religious/spiritual aspects <strong>of</strong> indigenous Afghans. 13<br />

Chaplains are expected to provide the commander information related to the religious customs and<br />

practices <strong>of</strong> indigenous peoples. In Afghanistan, the typical U.S. soldier has no idea <strong>of</strong> the differences<br />

between Sunni or Shiite, and between a mullah and an imam. First, the chaplain must determine what<br />

types <strong>of</strong> religious information are essential for the commander to understand. Next, the chaplain analyzes<br />

the local population to see how it understands these categories. Finally, the chaplain briefs the<br />

commander and staff and soldiers as appropriate. This type <strong>of</strong> religious advice to a commander is standard<br />

practice in the Army chaplaincy, a typical responsibility understood by all chaplains.<br />

Army chaplains are not in the intelligence gathering business. Chaplains, as religious advisors, must not<br />

allow themselves to drift too far into the realm <strong>of</strong> IO. It is one thing to interact with local religious leaders<br />

26 <strong>Military</strong> <strong>Intelligence</strong>


to facilitate dialogue and understanding to better advise the commander on the impact <strong>of</strong> local religions<br />

on the military mission. It is another thing altogether for a chaplain to gather information in a religious<br />

liaison capacity that unethically could be used for targeting or other <strong>of</strong>fensive operations. 14 Afghan religious<br />

leaders place a high value on clergy. The U.S. Army chaplain can engage in a respectful dialogue and<br />

exchange <strong>of</strong> ideas and cultural sensitivities in discussions with indigenous clergy. But the sacredness <strong>of</strong><br />

such dialogue must not be compromised by IO personnel eager to glean any information from the chaplain<br />

that may help their mission. A military chaplain who compromises the sacred bond between clergy will be<br />

instantly discredited by Afghan clerics, promoting distrust and disdain <strong>of</strong> all U.S. personnel.<br />

There are some legitimate ways a chaplain can serve as a staff <strong>of</strong>ficer in general support <strong>of</strong> IO. Chaplains<br />

working as liaisons with indigenous clergy can have a positive influence on the way <strong>American</strong> intentions<br />

and operations are perceived. These chaplain “liaison <strong>of</strong>ficers” are a part <strong>of</strong> IO and require a thorough<br />

understanding <strong>of</strong> the key religious leaders, religious worldview <strong>of</strong> the population, and social structure.<br />

The G2, G3, G5, and IO personnel <strong>of</strong>ten overlook or under emphasize this understanding. The staff chaplain,<br />

as a liaison with indigenous clergy, can be a crucial person in the analysis <strong>of</strong> religion and culture in<br />

IO, preventing U.S. and allied troops from committing cultural or religious blunders. For example, Joint<br />

Publication (JP) 1-05 allows the chaplain to advise commanders through their liaison roles with host nation<br />

religious leaders. Army Field Manual 1-05 states the same thing, instructing chaplains to support the<br />

Commander through relationships with indigenous clergy. 15<br />

The optimal time to integrate the analysis <strong>of</strong> religion and culture is during the mission analysis phase<br />

<strong>of</strong> the military decision making process (MDMP). This responsibility generally falls upon the G2/J2 Plans<br />

section. Here the chaplain can provide input as to the role <strong>of</strong> religion on military operations. Since IO sections<br />

can be small and limited in time and religious resources, ad hoc members are necessary to develop<br />

the cultural analysis requirement. It is here that a staff chaplain can contribute significantly. During the<br />

mission analysis, the IO section develops the IO <strong>Intelligence</strong> Preparation <strong>of</strong> the Battlespace (IPB). Essential<br />

elements <strong>of</strong> IO IPB include: an in-depth analysis <strong>of</strong> religion; an awareness <strong>of</strong> important religious and cultural<br />

dates and observances; an understanding <strong>of</strong> religious and social structure, and recognition <strong>of</strong> key<br />

religious leaders and their probable influence.<br />

FM 3-13 defines IO as “…the employment <strong>of</strong> the core capabilities <strong>of</strong> electronic warfare, computer network<br />

operations, psychological operations, military deception, and operations security, in concert with specified<br />

supporting and related capabilities, to affect or defend information and information systems, and to influence<br />

decision making.” 16 The FM specifically excludes the chaplain from the list <strong>of</strong> coordinating, special,<br />

and personal staff who have IO planning and support responsibilities. UMT personnel, both chaplains and<br />

chaplain assistants, should not be involved in the planning or execution <strong>of</strong> IO with the sole exceptions <strong>of</strong><br />

security for themselves and friendly forces and the location <strong>of</strong> sacred or humanitarian sites.<br />

All the core and supporting IO capabilities and functions, with the exception <strong>of</strong> operational and physical<br />

security, are either combatant tasks which chaplains, as noncombatants, are not legally authorized to directly<br />

engage in or highly technical tasks which are outside the realm <strong>of</strong> chaplain’s pr<strong>of</strong>essional responsibilities.<br />

Chaplain assistants, though combatants, should not be involved in the planning or execution <strong>of</strong> IO<br />

with the same exceptions, because their close association with the chaplain could create the appearance<br />

or contribute to the perception <strong>of</strong> the chaplain’s involvement in IO. 17<br />

Chaplains as Liaisons with Indigenous Clergy and IO<br />

Afghanistan is a religious country. Almost 100 percent <strong>of</strong> Afghans practice some type <strong>of</strong> Islam. Religion is<br />

a major cultural factor throughout all levels <strong>of</strong> the society. The role <strong>of</strong> religion and clergy in peacekeeping<br />

and nation building here must not be devalued. Most senior U.S. Army chaplains, as clergy and as <strong>of</strong>ficers,<br />

are well suited to advise commanders on religious issues and to act as intermediaries between military and<br />

indigenous religious leaders. Chaplains are positioned to communicate with local religious leaders to promote<br />

trust, coordination, problem solving, and to reduce local violence. 18 They can serve their commanders<br />

by acting as mediators with local mullahs or imams to build a relationship for civil military operations<br />

April - June 2009 27


(CMO). Any role for a chaplain as a liaison with indigenous clergy must be balanced by security concerns,<br />

by the commander’s intent, and by the skills and willingness <strong>of</strong> the chaplain. Some chaplains, for theological<br />

reasons, opt not to serve as religious liaisons to local clergy.<br />

The primary role <strong>of</strong> Army chaplains is to minister to the troops, the commander, and his staff. But chaplains<br />

as staff <strong>of</strong>ficers do have a role in networking with indigenous clergy. Chaplains can help to win the<br />

hearts and minds <strong>of</strong> local populations in support <strong>of</strong> U.S. policies to rebuild a peaceful Afghanistan which<br />

lawfully elects its own leaders and maintains a civil and humane society. The role <strong>of</strong> Army chaplains as<br />

liaisons with local clergy is mentioned in FM 1-05, which states: “Chaplains will support the commander<br />

through advisement in the following areas that may influence CMO: Relations with indigenous religious<br />

leaders when directed by the commander.” 19 When Army chaplains serve in a Joint Task Force or similar<br />

assignment with Navy, Air Force, or Marine personnel, Joint Publication (JP) 1-05 provides guidance on<br />

chaplains as religious liaisons. Approved by the Joint Chiefs <strong>of</strong> Staff, JP 1-05, Religious Support in Joint<br />

Operations, states:<br />

The JFCH [Joint Force Chaplain], after careful consideration and only with the Joint Force Commander’s<br />

approval, may serve as a point <strong>of</strong> contact to host nation (HN) civilian and military religious leaders,<br />

institutions, and organizations, including established and emerging military chaplaincies, through the<br />

Civil-<strong>Military</strong> Operations Center. 20<br />

As clergy and non-combatants, Army chaplains are respected in the Muslim world. By this status<br />

they are in a position to build bridges and networks with indigenous clergy. Unquestionably, the<br />

chaplain’s primary role is to provide religious support to Soldiers and their families, yet the role <strong>of</strong> a<br />

chaplain as a liaison to local clergy is clearly mentioned in various military publications. The doctrinal<br />

guidance is broad, giving commanders and chaplains flexibility in determining how best to fulfill this<br />

responsibility. Due to the ongoing nature <strong>of</strong> the War on Terror in Afghanistan, the U.S. will maintain<br />

peacekeeping, nation building, and stability operations for the foreseeable future. Since military personnel<br />

will have to engage the local population more and more in these operations, chaplains must be<br />

prepared to dialogue and interact with indigenous religious and community leaders.<br />

This is not an unusual or unrealistic expectation. In Afghanistan, military Judge Advocate General<br />

<strong>of</strong>ficers routinely work with the Afghan legal system; military surgeons work closely with Afghan community<br />

medical services; military engineers are active throughout Afghanistan working with local<br />

contractors on a wide array <strong>of</strong> construction projects; military Civil Affairs soldiers are active in rebuilding<br />

schools and donating school supplies to Afghani children; and military chaplains throughout<br />

Afghanistan are interacting with local mullahs and imams.<br />

Army chaplains routinely coordinate or assist with humanitarian and religious liaison missions.<br />

Because <strong>of</strong> these relationships with indigenous clergy, knowledge is gained through informal conversations<br />

that may contain information related to the U.S. military mission. Unsolicited information that<br />

affects the security <strong>of</strong> U.S. and allied forces should be reported. Relaying information about threats<br />

against U.S. interests does not violate the non-combatant status <strong>of</strong> a chaplain. But the chaplain who<br />

uses his religious status to gain intelligence from indigenous clergy with the intent <strong>of</strong> feeding that information<br />

to the G2, G3, or the IO staff has crossed the line and has assumed combative targeting<br />

tasks in violation <strong>of</strong> the non-combatant status <strong>of</strong> chaplains.<br />

Chaplains must instruct their commanders and the command staff as to the roles and responsibilities <strong>of</strong><br />

a chaplain related to IO. It can not be assumed that a commander or a command staff will know the details<br />

<strong>of</strong> what a chaplain can or cannot do related to the chaplain’s non-combative status. Commanders must<br />

take care not to utilize chaplains against military regulations. FM 1-05 states, “Under Title X <strong>of</strong> the U.S.<br />

Code, Chaplains should not perform the following: Human <strong>Intelligence</strong> (HUMINT) collection and/or target<br />

acquisition.” 21 Commanders must not utilize chaplains as intelligence <strong>of</strong>ficers. Chaplains are responsible<br />

for advising the commander when such expectations are prevalent. No military regulation states precisely<br />

28 <strong>Military</strong> <strong>Intelligence</strong>


what information a chaplain should or should not relay to the IO staff. The guiding principles are military<br />

regulations, maintaining the chaplain’s credibility with indigenous religious leaders, guidance from the<br />

commander, input from supervisory chaplains, and the conscience <strong>of</strong> the individual chaplain. These flexible<br />

guidelines must be assessed in light <strong>of</strong> the chaplain’s clear understanding <strong>of</strong> his non-combatant role.<br />

Army chaplains in Afghanistan were frequently involved with humanitarian missions. These missions,<br />

typically coordinated by chaplains with local mullahs, helped to renovate schools, supply orphanages,<br />

and rebuild mosques. Falling under the general identification <strong>of</strong> CMO, chaplains on humanitarian<br />

missions <strong>of</strong>ten worked with Civil Affairs <strong>of</strong>ficers and Public Affairs. In such relationships the chaplain<br />

must protect his non-combatant status, in that both Civil Affairs and Public Affairs soldiers routinely<br />

contribute intelligence to IO. In a Muslim culture, a U.S. Army chaplain is considered a clergyman, a<br />

person <strong>of</strong> esteem at the level <strong>of</strong> a mullah. The chaplain must ensure that his credibility is not compromised<br />

by working on CMO projects with other soldiers who are combatants. As one chaplain stated,<br />

“UMTs should…avoid the appearance <strong>of</strong> involvement in the execution <strong>of</strong> IO related activities to avoid<br />

undermining their credibility in support <strong>of</strong> CMO. Part <strong>of</strong> the reason that UMTs can be effective in conducting<br />

the CMO related function <strong>of</strong> liaison with indigenous religious groups is because <strong>of</strong> the perception<br />

that as religious leaders they will act as “honest brokers.” 22<br />

Contributions <strong>of</strong> Chaplains to IO: What Can the Chaplain Do?<br />

There are numerous examples <strong>of</strong> chaplains excelling in their role as a liaison or bridge-builder with<br />

local mullahs in Afghanistan. Chaplains were able to successfully perform these liaison and humanitarian<br />

missions without compromising their integrity as non-combatants. An example <strong>of</strong> interacting<br />

with indigenous clergy while rejecting the opportunity to feed intelligence to IO personnel was CH (CPT)<br />

Eric Eliason, who deployed to Afghanistan during 2004. As chaplain to the 1 st Battalion, 19 th Special<br />

Forces Group, CH Eliason refused to provide HUMINT or targeting information while he worked with<br />

local mullahs to coordinate the rebuilding <strong>of</strong> village mosques. 23<br />

An example <strong>of</strong> a senior Army chaplain who properly balanced his roles as a religious leader and a<br />

staff chaplain was CH (LTC) Larry Adams-Thompson, the CJTF 76 Chaplain in Afghanistan from March<br />

2004 through March 2005. Continuing the work <strong>of</strong> his predecessor CH (LTC) Ken Sampson, CH Adams-<br />

Thompson organized monthly meetings with local mullahs. The intent <strong>of</strong> these meetings was to discuss<br />

religious issues, moral concerns, and to build clergy-to-clergy relationships. Chaplains obtained funds<br />

to assist mullahs in the renovation <strong>of</strong> village mosques and orphanages. In one encounter, he learned<br />

that U.S. funds were readily building Afghan public schools but not the traditional religious schools, the<br />

madrassas. This created the perception that the U.S. was secular and not concerned about the religious<br />

needs <strong>of</strong> Afghanistan. CH Adams-Thompson knew that if he could get the construction <strong>of</strong> some madrassas<br />

authorized, a clear message would be sent to the Afghan people that the U.S. cared about the local<br />

religion and culture. In reflecting on the relationship between CH Adams-Thompson and local mullahs:<br />

Note that the feedback from the mullah was not related to combat operations. Rather, it provided an<br />

awareness <strong>of</strong> wider issues in the area <strong>of</strong> responsibility (AOR). CH Adams-Thompson encouraged chaplains<br />

to take similar issues from their meetings with mullahs back to their commanders. This example<br />

demonstrates how chaplains can advise commanding <strong>of</strong>ficers on the ways religion impacts the AOR. Local<br />

religious leaders, who usually are quite influential in their communities, can provide unique viewpoints on<br />

issues and concerns among the populace. Such insight is crucial for commanders, and chaplains are <strong>of</strong>ten<br />

in a unique position to provide it. This information is not tactical; rather, it is situational awareness that<br />

can be utilized to build bridges with the general population. As a result <strong>of</strong> CH Adams-Thompson bringing<br />

the education mullah’s assessment back to the command, approval was given to fund the construction <strong>of</strong><br />

a madrassas in Kapisa Province, the first U.S. effort <strong>of</strong> its kind in Afghanistan. 24<br />

Staff communication between the chaplain and the commander and his staff is essential to maintaining<br />

the unique status <strong>of</strong> chaplains as non-combatants. As chaplains communicated plainly what they<br />

were and were not able to do related to intelligence collection, their commands almost always respected<br />

April - June 2009 29


those boundaries. For example, shortly after arriving in Afghanistan, CH Adams-Thompson met with<br />

the G2 and told them what he could and could not do related to IO. He indicated that during his 12<br />

months in Afghanistan the command never asked him to utilize his connections with indigenous clergy<br />

in an improper manner. It is the responsibility <strong>of</strong> the chaplain as a staff <strong>of</strong>ficer to inform the command<br />

<strong>of</strong> his non-combatant boundaries. 25 Chaplains must be careful not to allow their networking with local<br />

religious leaders to be used inappropriately as targeting or human intelligence collection opportunities.<br />

If chaplains allowed themselves to be debriefed by G2, G3, or IO personnel in order to gain information<br />

related to combat operations, they would place their unique role as clergy non-combatants in jeopardy.<br />

What the chaplain can or cannot do related to interaction with indigenous clergy is guided by the<br />

commander. No commander wants his chaplain kidnapped, killed, or injured. Security for mullah<br />

engagements is a vital consideration. The concern is not only for the Army chaplains but for the local<br />

clergy with whom they meet. There were instances in Afghanistan in which intimidation, violence,<br />

or murder was committed against religious leaders who dialogued with U.S. chaplains. For example,<br />

CH (CPT) Guy McBride <strong>of</strong> the 173 rd Combat Support Battalion, who was in Afghanistan from March<br />

2005 through March 2006, recalled, “The mullah engagements in my area were not successful. I remember<br />

two <strong>of</strong> these engagements, after which both times the mullahs were assassinated.” 26 Careful<br />

consideration must be given as to how much danger local leaders face in relating with U.S. chaplains.<br />

Obviously the opportunity for chaplains to interact with indigenous clergy will be restricted or eliminated<br />

when the danger is too great. Chaplains must balance their roles as advisors to the commander<br />

on local religious issues against operational and force protection concerns.<br />

A religious liaison mullah engagement planned by CH (LTC) Ken<br />

Sampson and hosted by MG Lloyd Austin, Commander, CJTF 180,<br />

Bagram, Afghanistan. MG Austin is in the center <strong>of</strong> the photo.<br />

Photo by MSG Bruce Snowdeal.<br />

While Army chaplains typically enjoyed their interaction<br />

with indigenous clergy, there were moments<br />

<strong>of</strong> apprehension. Occasionally a chaplain<br />

understood that he was very close to becoming an<br />

intelligence <strong>of</strong>ficer gathering targeting information<br />

on the enemy. For example, CH (CPT) Isaac Opara<br />

<strong>of</strong> the 25 th Infantry Division conducted four mullah<br />

engagements during his June 2004 to April<br />

2005 tour in Afghanistan. He lamented that he<br />

did not have set IO guidelines as to what he could<br />

and could not report to his commander and staff.<br />

While helping with the rebuilding <strong>of</strong> schools and<br />

orphanages, he learned many things about the<br />

Afghan people. He stated that he walked “a thin<br />

line between hosting mullah engagements and becoming<br />

an Intel <strong>of</strong>ficer.” He stated, “I did not cross<br />

the line but I was an ear to the local people to hear complaints…I never reported info to anyone except<br />

my brigade chaplain.” 27<br />

Conclusion<br />

To fully develop the role <strong>of</strong> the military chaplain as a religious liaison for the commander, more training<br />

is needed. It is inaccurate to assume that chaplains with the rank <strong>of</strong> major or above are competent<br />

in religious liaison activities. <strong>Military</strong> chaplains must be trained at the major level and above to<br />

dialogue as religious leaders with indigenous clergy; to be sensitive to the religious culture <strong>of</strong> allied<br />

personnel and the HN; to understand mission and situational awareness related to religious issues; to<br />

engage in liaison activities with a clear understanding <strong>of</strong> the Commander’s intent and end state; and<br />

to not be used in any way as an intelligence gathering or targeting tool for IO.<br />

Chaplains <strong>of</strong> the rank <strong>of</strong> major or above are a valuable but underutilized resource in developing the<br />

analysis <strong>of</strong> an adversary’s religion and culture for the MDMP. Many IO missions begin before combat<br />

30 <strong>Military</strong> <strong>Intelligence</strong>


operations, and failure to understand the complexities <strong>of</strong> religion and culture can negatively impact<br />

those operations. Commanders and operations staff <strong>of</strong>ficers should understand that experienced chaplains<br />

can be a valuable multiplier in the total planning process by assisting in developing a religious<br />

impact assessment for the commander and staff. Chaplains should insist on the opportunity to participate<br />

in the process, although such participation is always bound by their status as non-combatants.<br />

Their products are critical for background support to IO, which requires an in-depth understanding <strong>of</strong><br />

culture for operations involving combat, peacekeeping, humanitarian assistance, and civil affairs.<br />

Endnotes<br />

1. FM 1-05, Religious Support, 2003, 1-5.<br />

2. Ibid., p. 1-6.<br />

3. Ibid.<br />

4. Ibid., 4-40.<br />

5. FM 3-13, Information Operations: Doctrine, Tactics, Techniques, and Procedures, 2003, 1-1, 1-2.<br />

6. AR 165-1, Chaplain Activities in the United States Army, 2004, 6.<br />

7. Ibid.<br />

8. FM 1-05, A-1.<br />

9. Ibid., 1-5, 1-6.<br />

10. Ibid., 1-1.<br />

11. Randy Edwards, “Information Operations and the Army Chaplaincy,” Command and General Staff College, unpublished paper, 2003,<br />

3.<br />

12. Ibid., p. 5.<br />

13. The term “religious/spiritual” refers to the system <strong>of</strong> beliefs and practices that give meaning and purpose to people’s lives, FM 1-05,<br />

F-1.<br />

14. Greg W. Hill and Rob Meyer, “The Role <strong>of</strong> the Chaplain in Information Operations,” The Army Chaplaincy, Summer/Fall 2002, 54-57.<br />

15. JP 1-05, Religious Support in Joint Operations, June 2004, II-3a5. See also FM 1-05, 2003, appendix A, A-1 and A-2.<br />

16. FM 3-13, 1-53.<br />

17. Jonathan Gibbs, “Unit Ministry Teams and Information Operations,” Unpublished Paper, U.S. Army Chaplain Center & School, 10<br />

March 2007.<br />

18. George Adams, “Lessons Learned for Iraq and Afghanistan: Chaplains as Liaisons with Religious Leaders,” Peaceworks, (Washington,<br />

DC: United States Institute <strong>of</strong> Peace, 2006), 1.<br />

19. FM 1-05, A-1.<br />

20. JP 1-05, II-3.<br />

21. FM 1-05, A-2.<br />

22. Gibbs, 2.<br />

23. Adams, 16.<br />

24. Ibid., 17.<br />

25. Ibid., 18.<br />

26. Questionnaire from CH (CPT) Guy McBride, 07 February 2007.<br />

27. Correspondence from CH (CPT) Isaac Opara to CH (LTC) Ken Lawson, 14 February 2007.<br />

Chaplain (LTC) Ken Lawson is currently the Installation Chaplain, Fort Buchanan, Puerto Rico. He joined the Army as a<br />

private in 1979, and entered the Army Chaplain Corps in 1989. He holds a PhD in U.S. History and is a 2007 graduate <strong>of</strong><br />

the U.S. Air Force Air War College.<br />

April - June 2009 31


<strong>Intelligence</strong> Collection in Counterinsurgency<br />

The views expressed in this article are those <strong>of</strong> the author and do not<br />

reflect the <strong>of</strong>ficial policy or position <strong>of</strong> the Departments <strong>of</strong> the Army and<br />

Defense, or the U.S. Government.<br />

Introduction<br />

“Because intelligence and operations are so closely<br />

related, it is important for collectors to be linked to<br />

the operators and analysts they support…collectors<br />

should not passively wait for operators to submit requirements;<br />

rather they should closely monitor the<br />

operational environment and recommend requirements<br />

based on their understanding <strong>of</strong> operators’<br />

needs.” –FM 3-24 Counterinsurgency, 3-129<br />

Many have now written on the necessity for the maneuver<br />

company commander to have an analytical<br />

capability within his formation. The Company<br />

<strong>Intelligence</strong> Support Team (CoIST) or Company<br />

<strong>Intelligence</strong> Cell has already been much discussed,<br />

even within this very publication, and few now disagree<br />

with the concept’s value. However, we must<br />

now begin to take the next step: Empowering the<br />

maneuver company commander not only with increased<br />

analytical capability, but intelligence collection<br />

capability as well.<br />

In a counterinsurgency (COIN), maneuver is the<br />

most important column on the intelligence, surveillance,<br />

and reconnaissance (ISR) collection matrix.<br />

The maneuver company and its platoons are in constant<br />

contact with the local populace everyday, from<br />

planned engagements to traffic control points, even to<br />

local nationals coming to the patrol base. The pulse<br />

<strong>of</strong> the insurgency lies with its ability to influence the<br />

population and that pulse can only be felt with the everyday<br />

contact made at the company level and below.<br />

Thus, the maneuver company commander is forced<br />

to devote an immense amount <strong>of</strong> his time to the collection<br />

and analysis <strong>of</strong> information. 1 Sir Frank Kitson<br />

adds that, “…the system involves a commander in<br />

collecting all the background information he can get<br />

from a variety <strong>of</strong> sources including the intelligence<br />

organization, and analyzing it very carefully in order<br />

to narrow down the possible whereabouts <strong>of</strong> the enemy,<br />

the purpose being to make deductions which<br />

will enable him to employ his men with some hope <strong>of</strong><br />

success as opposed to using them at random in the<br />

hope <strong>of</strong> making a contact.” 2<br />

by Captain David Beall<br />

Besides his own soldiers and perhaps a Raven<br />

Unmanned Aerial System (UAS), the maneuver company<br />

commander has no organic intelligence collection<br />

capability. He is forced to compete with his peers<br />

for assets to assist in his gathering <strong>of</strong> background information.<br />

The first place he looks is naturally to the<br />

battalion, where in practice there are more maneuver<br />

forces, in the form <strong>of</strong> different platoons, and the Human<br />

<strong>Intelligence</strong> (HUMINT) Collection Team (HCT).<br />

The HCT is usually made up <strong>of</strong> three to four<br />

<strong>Military</strong> Occupational Specialty (MOS) 35M HUMINT<br />

Collectors with one serving as the Team Leader.<br />

“The guiding principle to the use <strong>of</strong> HUMINT in<br />

support <strong>of</strong> <strong>of</strong>fensive operations is to minimize the<br />

time between when friendly forces encounter potential<br />

sources (detainees, refugees, and local civilians)<br />

and when a HUMINT collector screens them.” 3<br />

As the name implies, the HCT is taught to operate<br />

as a team, all or most attending every source<br />

meeting, thereby guaranteeing security and source<br />

familiarity with the collectors in case something<br />

should happen to one <strong>of</strong> the collectors (e.g., injury<br />

or Environmental Leave). This proves very frustrating<br />

to the Infantryman; the only time he interacts<br />

with the HCT is when he is tasked to escort them to<br />

source meetings, the information from which may<br />

not even concern his area <strong>of</strong> operations (AO). To<br />

make matters worse, in terrain where weather and<br />

distance hamper timely transportation between<br />

outposts, such as Afghanistan, or heavily IED’d<br />

lines <strong>of</strong> communication restrict regular movement,<br />

such as certain parts <strong>of</strong> Iraq, an HCT’s circulation<br />

to all company AOs is <strong>of</strong>ten severely hobbled.<br />

The Art <strong>of</strong> Locality<br />

“Insurgencies are local…The mosaic nature <strong>of</strong> insurgencies,<br />

coupled with the fact that all Soldiers<br />

and Marines are potential collectors, means that<br />

all echelons both consume and produce intelligence.<br />

This situation results in a bottom-up flow <strong>of</strong><br />

intelligence. This pattern also means that tactical<br />

units at brigade and below require a lot <strong>of</strong> support<br />

32 <strong>Military</strong> <strong>Intelligence</strong>


for both collection and analysis, as their organic intelligence<br />

structure is <strong>of</strong>ten inadequate.” –FM 3-24<br />

Counterinsurgency, 3-5<br />

To most effectively gather and analyze intelligence,<br />

the collector and analyst must become intimately<br />

familiar with the area in which they operate.<br />

Outside intelligence organizations provide products<br />

and analysis that are very useful, particularly for the<br />

objectivism that certain types <strong>of</strong> collection can give.<br />

But the primary source <strong>of</strong> what happens on a dayto-day<br />

basis has to come from those who live in the<br />

area and interact with the populace. 4 The analyst<br />

from afar can never fully appreciate the situation<br />

on the ground, and subsequently his products most<br />

<strong>of</strong>ten lack a focus that the supported unit is driving<br />

at. The same is true <strong>of</strong> the collector from afar and<br />

the collector who comes to visit only occasionally.<br />

This “visiting collector” is the HCT. As previously<br />

mentioned it comes to support when it has source<br />

meetings in companies’ AOs. The HCT will <strong>of</strong> course<br />

do its best to respond to any priority intelligence<br />

requirements (PIRs) <strong>of</strong> the company, but this is difficult<br />

since most company commanders have not<br />

been taught to create their own PIRs. Thus, commanders<br />

are constantly pinging the battalion S2<br />

shop for HUMINT support until they are fed up with<br />

the irregularity.<br />

If the HUMINTers are not local, then they never<br />

learn the mētis they require to be fully successful.<br />

That is, they never completely gain the local<br />

knowledge that is comprised <strong>of</strong> “a wide array<br />

<strong>of</strong> practical skills and acquired intelligence in responding<br />

to a constantly changing natural and human<br />

environment.” 5 If the HUMINTer lives with the<br />

company and constantly goes on patrols to spot and<br />

assess when not in source meetings, then his local<br />

knowledge is that <strong>of</strong> the company, and there is<br />

no loss between the collector and the customer due<br />

to misunderstanding. Furthermore, by developing<br />

mētis, the HUMINTer is a better collector; he understands<br />

the rationality behind the actions <strong>of</strong> those he<br />

aims to influence by living in their context and is also<br />

less susceptible to be taken in by false reporting.<br />

That is not to say HUMINTers do not go out on patrols<br />

with companies when they are placed at the<br />

battalion level. From time to time the HCT visits to<br />

go on missions with the company to see the AO and<br />

spot and assess. The argument however, is that in<br />

the most common configuration (the HCT as a bat-<br />

talion level collection asset), the access that the HCT<br />

has to every company’s AO is limited and generally<br />

is restricted to either whichever AO has more reporting,<br />

or whichever company commander is easier to<br />

work with. For the most part, the HCT is just another<br />

enabler that the commander is trying to juggle<br />

and coordinate for, just another visitor to his AO.<br />

As a visitor, the HUMINTer is only left with his<br />

techne, his understanding <strong>of</strong> his craft as a science,<br />

and lacks contextual insight. An HCT armed with<br />

its craft is powerful, but it is not COIN. COIN is local,<br />

and therefore intelligence collection must be as<br />

well.<br />

The HUMINTers are Part <strong>of</strong> the CoIST<br />

“HUMINT collectors may have to be placed in DS <strong>of</strong><br />

lower echelon combat maneuver forces (battalion<br />

and lower) to support operations. HUMINT and combat<br />

reporting by units in direct contact with threat<br />

forces and local inhabitants becomes the means <strong>of</strong><br />

collection.” –FM 2-22.3 Human <strong>Intelligence</strong> Collector<br />

Operations, 3-16<br />

HUMINTers need to be at the company level.<br />

Clearly, for MOS-specific training, this is impractical,<br />

but for operations it is necessary. The CoIST is,<br />

in effect, the S2 shop for the company; it empowers<br />

the company commander with a staff for information<br />

management and intelligence analysis. The CoIST<br />

pre-briefs and de-briefs patrols; analyzes combat information<br />

to create a company level enemy situation<br />

template; develops threat courses <strong>of</strong> action; targets,<br />

both lethally and non-lethally, at the company<br />

level; serves as a company link to the battalion S2;<br />

and recommends ISR requests and develops recommended<br />

PIR for the company commander.<br />

The HUMINTer is a natural extension <strong>of</strong> this concept,<br />

as he is capable <strong>of</strong> providing much more benefit<br />

than just <strong>Military</strong> Source Operations (MSO). The<br />

35M works in concert with the company commander<br />

and the CoIST team leader to better focus his collection.<br />

He reviews every patrol de-brief to expand his<br />

knowledge <strong>of</strong> the AO and to identify future sources<br />

<strong>of</strong> collection. He helps plan the company’s missions,<br />

sometimes planned around the HUMINTers’ source<br />

meetings. He also runs the company commander’s<br />

informant network; every company commander has<br />

informants, and these are <strong>of</strong>ten mishandled when<br />

the commander tries to illegally task them as if they<br />

were sources. The HUMINTer keeps the commander<br />

‘legal’ by managing who is worthy <strong>of</strong> being a source<br />

April - June 2009 33


and handling them appropriately. Within the CoIST,<br />

he can have a dedicated analyst, which provides<br />

sharper focus to HUMINT operations. 6 But perhaps<br />

most importantly, the HUMINTer goes on the majority<br />

<strong>of</strong> patrols, every planned operation, and attends<br />

every possible local leader engagement, The<br />

HUMINTer is now providing intelligence collection in<br />

support <strong>of</strong> all the lines <strong>of</strong> effort at the company level,<br />

and not solely focusing on security. He develops the<br />

mētis necessary to become a part <strong>of</strong> that company<br />

fight and AO through practice and experience. 7<br />

Despite the HUMINTer becoming part <strong>of</strong> the CoIST,<br />

the 35M reporting channels are unchanged. The<br />

individual HUMINTer still sends his reports to the<br />

HCT team leader, who in turn forwards the reports<br />

to the Operational Management Team. The HCT is<br />

not disbanded, just dispersed. The team leader still<br />

has responsibilities despite the team not operating<br />

as one unit. In addition to reviewing and editing his<br />

team’s reports, he is also responsible for weighting<br />

heavy collection areas or planned operations with<br />

additional HUMINT support. The team leader must<br />

still hold meetings, virtually or telephonically if need<br />

be, with all <strong>of</strong> his HUMINTers to provide mentorship<br />

and ensure information sharing across the battalion’s<br />

AO. He also has to manage, with oversight<br />

from the MI company (MICO), which HUMINTer is<br />

with which company. Certain HUMINTers may not<br />

fit into some companies’ command climates, so the<br />

team must remain flexible to adjust.<br />

The HUMINTer’s interactions with the company<br />

commander, platoon leaders, and other members<br />

<strong>of</strong> the CoIST are as important as his interactions<br />

with the local populace. This fusion <strong>of</strong> the collector,<br />

the analyst, and the consumer at the company and<br />

platoon levels, enables counterinsurgents to execute<br />

operations more effectively, sooner. 8<br />

Iraq<br />

“All actions designed to retain and regain the allegiance<br />

<strong>of</strong> the population are relevant to the process<br />

<strong>of</strong> collecting background information….” –Sir<br />

Frank Kitson, Low Intensity Operations: Subversion,<br />

Insurgency, and Peacekeeping<br />

As the S2 for 3-509th Infantry Battalion (Airborne),<br />

I had a very interesting deployment to Iraq. Before<br />

the deployment began, I set up CoISTs in each <strong>of</strong><br />

our companies. We began the deployment with our<br />

Transfer <strong>of</strong> Authority (TOA) in Iskandariyah, at the<br />

end <strong>of</strong> November <strong>of</strong> 2006. In December we were de-<br />

tached from our brigade and sent to the Marines in<br />

Al Anbar. We returned to Iskandariyah at the end<br />

<strong>of</strong> June 2007, where we served in a Brigade Strike<br />

Force for three months. We then owned battlespace<br />

in Iskandariyah again for the final two months. In<br />

each <strong>of</strong> those moves, the methods available for collecting<br />

intelligence varied greatly. Often the sources<br />

<strong>of</strong> intelligence were extremely undeveloped or not<br />

available at all at the start <strong>of</strong> each new phase <strong>of</strong><br />

the deployment. This fomented the establishment <strong>of</strong><br />

creative methods to maximize collection and generate<br />

substance for the targeting process. Our time in<br />

Garmah, Iraq, a small city and region northeast <strong>of</strong><br />

Fallujah, was a notable example.<br />

We arrived in Garmah in late December 2006, and<br />

took control from an Iraqi Army Brigade(-), who relocated<br />

to Baghdad in support <strong>of</strong> the Surge. There was<br />

no Relief in Place/TOA and no intelligence hand-<strong>of</strong>f.<br />

The Shi’a Iraqi Army had largely alienated the local<br />

Sunni population and had become prisoners in<br />

their own patrol bases due to Al Qaida’s dominance.<br />

The Iraqi Army had burned every HUMINT source<br />

they had. We started from zero.<br />

At first, my HUMINT Team Leader intended to run<br />

operations like he had in Iskandariyah, largely waiting<br />

for walk-ins to come to the forward operating<br />

base (FOB) and requesting to go on missions with<br />

companies when he felt the team had time. However,<br />

one <strong>of</strong> the biggest changes from Iskandariyah to<br />

Garmah was that the companies were now living in<br />

six separate combat outposts, and not on the large<br />

FOB where the Battalion Headquarters was located.<br />

There was no HUMINT reporting.<br />

The continued absence <strong>of</strong> HUMINT reporting was decisive<br />

in persuading the HUMINTers that they needed<br />

to live with the companies or they would never acquire<br />

any sources, nor have any idea what the environment<br />

was like. Once they left, they never came back. The<br />

HCT was divided in order to have at least one collector<br />

per company. Staff Sergeant Ken Del Valle maintained<br />

all <strong>of</strong> his team leader responsibilities, and still provided<br />

constant feedback to the battalion S2 shop.<br />

At first company commanders did not know<br />

how to use 35Ms, but through coaching from the<br />

HUMINTers themselves and the S2 shop, eventually<br />

all <strong>of</strong> the commanders began integrating them into<br />

mission planning. Captain Matt Gregory and his<br />

Able Company, 3-509th IN (ABN), took the greatest<br />

advantage <strong>of</strong> having a HUMINTer at the company<br />

34 <strong>Military</strong> <strong>Intelligence</strong>


level. He quickly recognized the concept’s utility:<br />

“The 35Ms assigned to my company were the biggest<br />

combat multipliers by far.” 9<br />

Able Company accelerated past her sister companies<br />

in the battalion task force due largely to superior<br />

intelligence collection efforts. They focused on gathering<br />

background information on the local area and<br />

populace that either had never been gathered before,<br />

or had been lost. Additionally, CPT Gregory incorporated<br />

SSG Del Valle and the CoIST into his mission<br />

planning process. Able Company began focused patrols<br />

and planned missions where the HUMINTer was<br />

the main effort; “We conducted patrols specifically in<br />

order for SSG Del Valle to engage the local population<br />

in specific areas, and this had a tremendous effect<br />

over time.” 10 By integrating into Able Company,<br />

he began to not only spot and assess on every patrol,<br />

but also gained the local knowledge that he could<br />

not have by simply visiting from Camp Fallujah. CPT<br />

Gregory soon recognized that the HUMINTer could<br />

assist in more than just producing reports, and began<br />

to utilize him in planning his political engagements<br />

and information operations messages.<br />

Another innovator was CPT Stew Lindsay, commander<br />

<strong>of</strong> Charlie Company, 3-509 th IN (ABN) in<br />

North Babil Province, Iraq. Early in CPT Lindsay’s<br />

command, there was no HUMINT support, and he<br />

was forced to run an extensive informant network<br />

in order to gather any intelligence on the ground.<br />

“Local nationals would come and tell me information<br />

all <strong>of</strong> the time, but because I was not a HUMINTer,<br />

I could not put the intelligence into a format that<br />

would allow me to detain someone.” 11 The Iraqis living<br />

in Charlie Company’s AO were frustrated since<br />

they were providing information on Al Qaida, but the<br />

Coalition Forces were unable to arrest the enemy.<br />

Visits from HUMINTers alleviated some <strong>of</strong> the reporting<br />

legitimacy problems, but did not adequately<br />

resolve the issue.<br />

After receiving a dedicated 35M, CPT Lindsay<br />

was able to reorganize his operations to focus on<br />

building the intelligence framework necessary to<br />

support one <strong>of</strong> the most successful company targeting<br />

efforts in the brigade. “I took my HUMINTer<br />

with me everywhere; I took him to Sheik engagements,<br />

Iraqi Security Force meetings, infrastructure<br />

events, raids, you name it…” 12 Additionally, Charlie<br />

Company’s HUMINTer, Sergeant Micah Boor, assumed<br />

CPT Lindsay’s informant network, was able<br />

to apply his craft, and turned most <strong>of</strong> them into<br />

legitimate sources. SGT Boor played an integral<br />

part in the company’s targeting process as Lindsay<br />

adds, “I was focusing on so many different things<br />

as a company commander; having SGT Boor and<br />

the CoIST there to keep all <strong>of</strong> the background information<br />

straight and make realistic lethal, nonlethal,<br />

and ISR targeting recommendations was<br />

tremendous.” 13 Through targeting with SGT Boor,<br />

and later 35M Specialist Wayne Border, Lindsay’s<br />

weekly detainment rate rose 800 percent over a<br />

three month period. 14 Finally, CPT Lindsay established<br />

a Company SOP for operations on the objective<br />

that featured the HUMINTer screening potential<br />

detainees with focused tactical questioning (TQ),<br />

while his CoIST performed tactical site exploitation<br />

(TSE) and started detainment paperwork.<br />

Unfortunately, some company commanders were<br />

less open minded with tactical planning or distrustful<br />

<strong>of</strong> intelligence in general. There was some misuse<br />

at first, until the battalion field grade <strong>of</strong>ficers could<br />

be convinced to correct it. The other companies’ success<br />

with their assigned HUMINTers was more gradual,<br />

but it was nevertheless there. It took more time<br />

for them to learn CPT Gregory’s lesson: “If you put<br />

him [the 35M] at the back <strong>of</strong> the patrol and forget<br />

about him you will get nothing in return, but if you<br />

put him up front and put his talent to work, then<br />

you will get more than you could ever ask for.” 15<br />

Afghanistan<br />

“Yet a man who uses an imaginary map, thinking<br />

that it is a true one, is likely to be worse <strong>of</strong>f than<br />

someone with no map at all; for he will fail to inquire<br />

whenever he can, to observe every detail on his<br />

way, and to search continuously with all his senses<br />

and all his intelligence for indications <strong>of</strong> where he<br />

should go.” –E.F. Schumacher, Small is Beautiful<br />

Following the Iraq deployment <strong>of</strong> 4th Brigade<br />

(Airborne), 25th Infantry Division (Light), I moved<br />

from battalion S2 to MICO Commander, and naturally<br />

sought to incorporate the intelligence lessons<br />

learned into training and operations for the current<br />

deployment to Afghanistan. It is difficult to effect<br />

change in a large organization without the support <strong>of</strong><br />

the chain <strong>of</strong> command. But this turned out not to be<br />

an issue as the new brigade commander also believed<br />

strongly in both the importance <strong>of</strong> the CoIST, and<br />

also the company level placement <strong>of</strong> HUMINTers. He<br />

had drawn the same conclusions from his previous<br />

April - June 2009 35


service in Afghanistan as I had in Iraq. Accordingly,<br />

the CoIST concept was soon implemented in every<br />

maneuver company in the brigade.<br />

The 4/25th ABCT CoIST is comprised <strong>of</strong> six people,<br />

and is uniform throughout the brigade’s maneuver<br />

companies. The only MOS-specific positions<br />

are one MOS 35F <strong>Intelligence</strong> Analyst and one MOS<br />

35M HUMINT Collector. The other positions are<br />

the CoIST Team Leader, the Raven Operator, the<br />

Analyst Assistant, and the HUMINT Assistant, and<br />

are MOS immaterial. Careful training and control<br />

has been placed on the HUMINT Assistant to ensure<br />

that no laws are broken. They cannot conduct MSO,<br />

but rather serve as a dedicated analyst for the 35M<br />

and perform some tasks HUMINTers receive more<br />

in-depth training in, such as TSE/TQ, etc.<br />

There are, <strong>of</strong> course, challenges with the both the<br />

CoIST concept and having HUMINTers at the companies.<br />

The first, as I mentioned in my Iraq experience,<br />

is that most Infantryman do not know what a<br />

HUMINTer can do, and they are subsequently misused.<br />

My First Sergeant and I have played a direct<br />

liaison role with all <strong>of</strong> the maneuver companies; we<br />

sought early in the life cycle to establish positive<br />

working relationships so that we could help them<br />

understand the role <strong>of</strong> intelligence at the company<br />

level and prevent collectors and analysts from being<br />

relegated to radio watch and the like.<br />

Another valid argument is that just as in any unit,<br />

the HUMINT platoon members have a varying level<br />

<strong>of</strong> experience and maturity. One maneuver company<br />

will get a noncommissioned <strong>of</strong>ficer with combat<br />

experience and additional HUMINT schools,<br />

and another will get a HUMINTer straight out <strong>of</strong> initial<br />

entry training. Therefore, the junior 35Ms can<br />

scarcely get the mentorship needed in their craft.<br />

The junior soldiers are also likely to be less confident<br />

in their HUMINT skills and may have difficulty<br />

making solid recommendations to Infantry captains.<br />

We identified these issues in advance and did<br />

our best to match personalities <strong>of</strong> command teams<br />

to HUMINTers, but were confident that these hurdles<br />

were worth it. Leader training was the priority<br />

in pre-deployment, and I stressed that it included<br />

every HUMINTer. There have been some conflicts,<br />

and we have adjusted to the best <strong>of</strong> our ability to<br />

ensure adequate support for all the units.<br />

A third problem was the availability <strong>of</strong> Category-II<br />

Interpreters in order to maintain legality for<br />

HUMINTers conducting MSO. Obtaining all <strong>of</strong> the<br />

interpreters was easier than we anticipated. We<br />

provided detailed justifications for our increased<br />

interpreter requirement to the contracting companies<br />

and, in less than a month, they all arrived.<br />

When we arrived in Afghanistan, we relieved the<br />

previous unit’s “HUMINT map.” 16 Three-fourths<br />

<strong>of</strong> its organic HUMINT collection had been placed<br />

in one battalion’s AO. They were placed there because<br />

that was where the unit believed the majority<br />

<strong>of</strong> collection was to be found. In addition, a few attached<br />

HUMINTers provided coverage in two other<br />

areas. Another reason they never tried to expand<br />

their HUMINT coverage geographically was that they<br />

thought other organizations were already collecting<br />

where their brigade had gaps, so there was no point<br />

to alter the order <strong>of</strong> things. However, the most important<br />

reason why the majority <strong>of</strong> the maneuver companies<br />

rarely saw the HUMINTers was because there<br />

were only four HCTs, and they remained intact.<br />

By focusing on their imaginary HUMINT map, no<br />

one could confirm or deny whether there were more<br />

sources to be had in many <strong>of</strong> the remote areas. Instead<br />

<strong>of</strong> replacing HUMINT one-for-one, we drove on with<br />

our more dispersed CoIST-focused HUMINT lay down.<br />

Our HUMINTers are spread out over fifteen different<br />

locations. They were able to take on the former unit’s<br />

source pool and quickly expand it. In the areas where<br />

there wasn’t supposed to be any reporting, we have acquired<br />

sources. The previous unit failed to confront the<br />

fact that even if there were other organizations running<br />

sources in some areas, those organizations would be<br />

collecting on a different set <strong>of</strong> criteria and responding<br />

to a different chain <strong>of</strong> command’s priorities. The area<br />

that our sources report on has approximately doubled<br />

the previous unit’s network in less than ninety days.<br />

The area covered by our source network also has a<br />

greater correlation to occurrence <strong>of</strong> significant activity<br />

than the previous HUMINT map. However, these are<br />

measures <strong>of</strong> performance, and not effectiveness. The<br />

measures <strong>of</strong> effectiveness will not become evident until<br />

more reflection has been achieved. But, as <strong>of</strong> right now,<br />

it would be fair to say that several <strong>of</strong> the earlier internal<br />

critics have been greatly persuaded, if not won over.<br />

Conclusion<br />

“They said…that he was so devoted to Pure Science<br />

… that he would rather have people die by the<br />

right therapy than be cured by the wrong.” –Sinclair<br />

Lewis, Arrowsmith<br />

36 <strong>Military</strong> <strong>Intelligence</strong>


Afghanistan is not Iraq, anyone who has deployed<br />

to either knows this and is frequently reminded.<br />

However, whether addressing an urban insurgency<br />

or a rural insurgency, “…the HUMINT collectors<br />

must be able to maintain daily contact with the local<br />

population.” 17 The closer a HUMINTer can get<br />

to the population the better. In a bottom-up intelligence<br />

structure, the place <strong>of</strong> the collector is at the<br />

bottom, not mid-way.<br />

There has been much resistance to the changes<br />

that constitute this concept. The majority <strong>of</strong> this resistance<br />

comes not from the collector himself, but<br />

from those with great HUMINT experience in the<br />

pre-9/11 Army. Team centricity is well established<br />

in the HUMINT schoolhouse and amongst its subject<br />

matter experts. But it has been my experience that<br />

when this concept is tried, the hands-on experience<br />

turns some doubters into believers. Just like my<br />

Team Leader in Garmah, who fought against separating<br />

the HCT and living with the companies, once<br />

they go, most don’t look back. Still others remain<br />

entirely obstinate, because it is not taught that way<br />

and involves letting go <strong>of</strong> control. In the end, however,<br />

this concept is really just another manifestation<br />

<strong>of</strong> the HUMINT collector being able to, “operate<br />

with minimal equipment and deploy in all operational<br />

environments in support <strong>of</strong> <strong>of</strong>fensive, defensive,<br />

stability and reconstruction operations, or civil<br />

support operations. Based on solid planning and<br />

preparation, HUMINT collection can provide timely<br />

information if deployed forward in support <strong>of</strong> maneuver<br />

elements.” 18<br />

“There are never enough HUMINT collectors to<br />

meet all requirements.” 19 But this is a maxim true <strong>of</strong><br />

all intelligence, whether collection or analysis, and<br />

doubly so in COIN. The increased intelligence burden<br />

that COIN creates easily exposes the inadequacy<br />

<strong>of</strong> the BCT intelligence modified table <strong>of</strong> equipment.<br />

Low-Level Voice Intercept Teams in every CoIST<br />

would allow Signals <strong>Intelligence</strong> (SIGINT) collection<br />

and tactical intelligence fusion at the company, but<br />

the MICO’s SIGINT manning simply doesn’t support<br />

it. The UAS platoon is designed to only have one aircraft<br />

flying an ISR mission at a time. But, with more<br />

operators and maintainers, it would not be difficult<br />

to sustain aircraft conducting persistent surveillance<br />

on multiple objectives.<br />

There aren’t enough collection assets in the BCT’s<br />

MICO to satisfy the requirements <strong>of</strong> the maneuver<br />

company. This problem is exacerbated even further<br />

by the employment <strong>of</strong> field artillery and brigade special<br />

troops battalions as maneuver formations, as is<br />

common practice in Afghanistan and Iraq today. As<br />

demonstrated earlier in the article, intelligence collection<br />

in a COIN is not “plug and play,” you cannot<br />

train effective intelligence collection systems<br />

while divorced from maneuver. The modular design<br />

<strong>of</strong> the BCT necessitates an intelligence collection system<br />

that is integrated with maneuver during training<br />

and in combat. All <strong>of</strong> these factors place the tactical<br />

company grade MI <strong>of</strong>ficer in the pillory for the lack <strong>of</strong><br />

organic intelligence capability within the BCT. It becomes<br />

his job to “create” more. Training non-MI MOS<br />

soldiers in the crafts <strong>of</strong> some INTs involves plotting an<br />

absurd course between the desires <strong>of</strong> maneuver and<br />

the requirements <strong>of</strong> statutes, both military and nonmilitary.<br />

But that, clearly, is another article.<br />

Endnotes<br />

1. Frank Kitson, Low Intensity Operations: Subversion, Insurgency,<br />

and Peacekeeping (St. Petersburg: Hailer Publishing, 1971), 98-9.<br />

2. Kitson, 97.<br />

3. FM 2-22.3, Human <strong>Intelligence</strong> Collector Operations, September<br />

2006, 3-2.<br />

4. Kitson, 96.<br />

5. James C. Scott, Seeing Like a State: How Certain Schemes to<br />

Improve the Human Condition Have Failed (New Haven: Yale<br />

University Press, 1998), 313.<br />

6. FM 2-22.3, 2-12.<br />

7. Scott, 317.<br />

8. FM 3-24, Counterinsurgency, December 2006, 5-39.<br />

9. Interview with Major Matthew Gregory, USA, FOB Salerno,<br />

Afghanistan, 2 May 2009.<br />

10. Ibid.<br />

11. Interview. Major Stewart Lindsay, USA, FOB Salerno,<br />

Afghanistan, 12 May 2009.<br />

12. Ibid.<br />

13. Ibid.<br />

14. Ibid.<br />

15. Interview, Gregory.<br />

16. This is not intended as criticism <strong>of</strong> the out-going unit. Their<br />

approach was not unreasonable and, in fact, might be considered<br />

normal and customary. Instead, the intent is to document the gains<br />

achieved over the traditional methods <strong>of</strong> HUMINT operations.<br />

17. FM 2-22.3, 3-9.<br />

18. FM 2-22.3, 1-31.<br />

19. FM 2-22.3, 1-32.<br />

Captain David Beall is currently serving as the MICO<br />

Commander for the 4/25 th Airborne BCT in Operation Enduring<br />

Freedom. He also served as the S2 for TF 3-509 th IN (ABN) and<br />

an Armor Platoon Leader in TF 1-16 IN (MECH) during his two<br />

deployments to Operation Iraqi Freedom. He is a graduate <strong>of</strong><br />

the University <strong>of</strong> Montana and an Anna Sobel Levy Fellow.<br />

April - June 2009 37


y George A. Van Otten, PhD<br />

Introduction<br />

The border that separates the U.S. and Mexico runs<br />

for approximately two thousand miles through some<br />

<strong>of</strong> the most challenging and inhospitable terrain in<br />

North America. It is also a place plagued by persistent<br />

violence and crime. Currently, smugglers move<br />

thousands <strong>of</strong> undocumented immigrants and massive<br />

quantities <strong>of</strong> illegal drugs across the border into<br />

the U.S. Moreover, until recently, illegal activities<br />

along the border have steadily increased over the<br />

last several decades.<br />

During the same period <strong>of</strong> time, violence along the<br />

border has become almost endemic thereby forcing<br />

the Mexican government to directly confront the extremely<br />

well financed, well armed, and dangerous<br />

Mexican drug-trafficking organizations <strong>of</strong> northern<br />

Mexico. Smugglers who operate along the border<br />

spread terror by killing police, reporters, <strong>of</strong>ficials,<br />

and members <strong>of</strong> rival organized crime units. 1 In border<br />

cities such as Agua Prieta and Naco, Sonora,<br />

increasingly violent acts against police and other<br />

<strong>of</strong>ficials now make it difficult for Mexico to recruit<br />

people to serve in law enforcement. Since December<br />

<strong>of</strong> 2006, more than 5,000 Mexican citizens (including<br />

many public <strong>of</strong>ficials) have been killed in drugrelated<br />

violence. 2<br />

In addition to the tumult that organized crime<br />

brings to the region, gang members and smugglers<br />

also effectively bribe and intimidate people on both<br />

sides <strong>of</strong> the border. They know how to recruit people<br />

driven by need, as well as those driven by greed.<br />

Mexican drug cartels and criminal gangs have<br />

greatly expanded their operations since the Medellin<br />

and Cali drug cartels in Colombia were curtailed<br />

by the cooperative efforts <strong>of</strong> the governments <strong>of</strong><br />

Colombia and the U.S. In addition to illegal drugs,<br />

these cartels and gangs are also engaged in human<br />

smuggling. 3<br />

Whereas most <strong>American</strong>s worry about the onerous<br />

implications <strong>of</strong> the current situation, people who live<br />

near the border in California, Arizona, New Mexico<br />

and Texas regularly experience first hand the impacts<br />

<strong>of</strong> illegal immigration and drug trafficking.<br />

For many communities in these states, smuggling<br />

strains the capabilities <strong>of</strong> their law enforcement and<br />

emergency response agencies. Furthermore, the recruitment<br />

<strong>of</strong> young men and women by drug cartels<br />

weakens the social fabric <strong>of</strong> <strong>American</strong> towns, cities<br />

and rural counties in the region. Although human<br />

and drug smuggling along the entire reach <strong>of</strong><br />

the border between Mexico and the U.S. is an immense<br />

problem that is, in one way or another, felt<br />

by all <strong>American</strong>s, no community has suffered more<br />

than the residents <strong>of</strong> the Tohono O’odham Nation <strong>of</strong><br />

Southern Arizona.<br />

Arizona<br />

The Tohono O’odham Reservation<br />

38 <strong>Military</strong> <strong>Intelligence</strong><br />

Colorado River<br />

Gila River<br />

Mexico<br />

Gila Bend<br />

Tohono O’odham<br />

Phoenix Salt River<br />

Tohono<br />

O’odham<br />

Reservation<br />

Gila River Reservation<br />

Gila River<br />

Santa Cruz<br />

River<br />

Tucson<br />

San Pedro River<br />

San Xavier<br />

Reservation<br />

N


The southern boundary <strong>of</strong> the Tohono O’odham<br />

(formerly called Papago) Reservation runs for approximately<br />

78 miles along the U.S. border with Mexico.<br />

When the current boundary was established in the<br />

mid-nineteenth century by the Gadsden Treaty between<br />

Mexico and the U.S., no one seemed to notice<br />

that the new border cut through the traditional<br />

homeland <strong>of</strong> the Tohono O’odham (Desert People).<br />

The Desert People generally disregarded the border<br />

and travelled back and forth between Mexico and<br />

the U.S. with few restrictions. Over the last several<br />

decades however, tightened security has made<br />

cross-border travel for the Tohono O’odham increasingly<br />

difficult. For all practical purposes, the<br />

Tohono O’odham who have always wanted to be left<br />

to live in keeping with their traditional ways and<br />

values (Him-dag), are now caught in the middle <strong>of</strong><br />

the ongoing international crisis on the border.<br />

The Tohono O’odham<br />

The Tohono O’odham have occupied the desert region<br />

<strong>of</strong> southern Arizona and northern Sonora for<br />

centuries. Their traditional semi-nomadic, agricultural<br />

lifestyle was intrinsically intertwined with the<br />

summer monsoon rains <strong>of</strong> the desert that brought<br />

their crops to fruition.<br />

Prior to the <strong>of</strong>ficial demarcation <strong>of</strong> the Reservation,<br />

the Tohono O’odham system <strong>of</strong> governance focused<br />

on the family, clan, and village. Traditionally, villages<br />

were led by headmen who settled disputes and<br />

provided guidance. Headmen also protected the sacred<br />

artifacts <strong>of</strong> the village and made certain that<br />

ceremonies followed proper traditions. 4 Throughout<br />

their history, the Tohono O’odham were, and have<br />

remained, a peaceful people dedicated to the preservation<br />

<strong>of</strong> their language, culture and traditions.<br />

Spanish Influence<br />

When the Spanish first arrived in the Santa Cruz<br />

River Valley in the 1680s, they were surprised to<br />

find irrigated fields spreading out for several miles<br />

on both sides <strong>of</strong> the river near the village <strong>of</strong> Bac<br />

(near the site <strong>of</strong> modern-day Tucson). Soon after,<br />

the Spanish priest, Eusebio Kino arrived in the region<br />

and almost immediately initiated the construction<br />

<strong>of</strong> missions in order to convert the indigenous<br />

people to Catholicism. He also sought to establish<br />

European style ranches and mines. Although<br />

he was primarily interested in saving souls, Father<br />

Kino also had a passion for farming and ranching.<br />

He introduced European crops to indigenous farmers<br />

and encouraged them to move into permanent<br />

settlements near the missions.<br />

In the 1700s, the Apache began to raid O’odham<br />

villages. 5 Despite European influences and Apache<br />

raids however, the Tohono O’odham continued to<br />

cling to their traditions. They were nonetheless<br />

changed by these encroachments in that many adopted<br />

the Catholic faith, learned to raise cattle and<br />

European crops, and were forced to develop effective<br />

defenses against those who attacked them. 6<br />

The Tohono O’odham and Mexico<br />

Mexico became independent from Spain in 1821.<br />

By 1828, the Mexican government began closing<br />

Spanish missions throughout the Tohono O’odham<br />

homeland and for the most part, left the Desert<br />

People alone. Even so, many Mexican citizens continued<br />

to establish farms, ranches and mines in areas<br />

traditionally occupied by the Tohono O’odham.<br />

By 1840, such encroachments were becoming serious<br />

enough to cause conflicts between Mexican immigrants<br />

and the Desert People. At one point, the<br />

Tohono O’odham battled with these immigrants<br />

near the Mexican border-town <strong>of</strong> Cobota. 7<br />

The <strong>American</strong>s and the New Border<br />

In 1846, the U.S. and Mexico fought over the location<br />

<strong>of</strong> the international border between the two<br />

nations. In 1848, the Treaty <strong>of</strong> Guadalupe Hidalgo<br />

ended the war, but the exact location <strong>of</strong> the border<br />

was not formalized until 1853 when both nations<br />

signed the Gadsden Treaty. Despite the fact<br />

that the new border cut through the heart <strong>of</strong> the<br />

Tohono O’odham homeland, the U.S. and Mexico<br />

did not include representatives <strong>of</strong> the Desert People<br />

in the negotiations. Moreover, the U.S. did not grant<br />

citizenship to the Tohono O’odham who lived on<br />

the north side <strong>of</strong> the new border. 8 Without citizenship,<br />

and without the protection <strong>of</strong> a formally established<br />

reservation, the O’odham homeland north<br />

<strong>of</strong> the border became part <strong>of</strong> the public domain <strong>of</strong><br />

the U.S., thereby opening these lands to <strong>American</strong><br />

settlers. As non-Indians began to settle on their<br />

land, the Desert People moved further into more<br />

isolated parts <strong>of</strong> their territory. 9 Additionally, the<br />

Desert People and non-Indians disagreed over the<br />

use <strong>of</strong> land and water. To put an end to this tension,<br />

President U.S. Grant created the 71,000 acre San<br />

Xavier Reservation near the city <strong>of</strong> Tucson, Arizona<br />

April - June 2009 39


in 1874. In 1882 the federal government set aside<br />

another 10,000 acres near Gila Bend, Arizona.<br />

Because many <strong>of</strong> the Desert People did not move<br />

to the reservations, they continued to clash with<br />

non-Indians in the area. In 1916, the federal government<br />

responded by setting aside more than two<br />

million acres for the use <strong>of</strong> the Desert People. 10 Over<br />

the next thirty years, it added additional pieces <strong>of</strong><br />

land to the Reservation. It is now the second largest<br />

Native <strong>American</strong> reservation (after the Navajo) in<br />

the U.S. 11<br />

In 1934, in keeping with the Indian Reorganization<br />

Act, the Tohono O’odham established the “Papago<br />

Tribe <strong>of</strong> Arizona.” 12 The creation <strong>of</strong> a centralized<br />

tribal government was a dramatic departure from<br />

the traditionally decentralized, village-based, consensus-oriented<br />

O’odham culture and many tribal<br />

members continued to go to their villages to discuss<br />

problems and ask for decisions. 13<br />

Over the years following the implementation <strong>of</strong><br />

the Indian Reorganization Act, the tribal government<br />

located at Sells, Arizona has increased its<br />

authority over the affairs <strong>of</strong> the Desert People.<br />

Moreover, the Tribal Legislative Council is empowered<br />

by its fiduciary role for federal and tribal<br />

dollars and by the tendency <strong>of</strong> all non-O’odham<br />

to go to the Council to transact business on the<br />

Reservation. Therefore, though many continue to<br />

practice traditional ways, and the O’odham language<br />

is spoken throughout the Reservation, regular<br />

interaction with the dominant society makes<br />

the preservation <strong>of</strong> the traditional culture an increasingly<br />

challenging goal.<br />

The Tohono O’odham Reservation<br />

This is a vast, rugged region <strong>of</strong> exceptional beauty<br />

that encompasses approximately three million acres<br />

immediately north <strong>of</strong> the U.S. border with Mexico.<br />

Despite some urban development near Sells (the<br />

Nation’s capital) and the cultivation <strong>of</strong> thousands<br />

<strong>of</strong> acres by the tribal farm, the lion’s share <strong>of</strong> the<br />

Reservation continues to be characterized by large<br />

tracts <strong>of</strong> natural desert and open range dotted with<br />

small villages and family compounds.<br />

The desert <strong>of</strong> Southern Arizona is characterized<br />

by hot summers with temperatures <strong>of</strong>ten exceeding<br />

100 degrees. Although winters are generally<br />

mild, night time temperatures sometimes drop be-<br />

low freezing. Normally, rainfall is scant, but from<br />

time to time, summer thunder storms result in torrents<br />

<strong>of</strong> water that flood washes and restrict travel.<br />

Natural vegetation on the Reservation is surprisingly<br />

lush and includes a wide variety <strong>of</strong> desert<br />

flora. Reservation wildlife, typical <strong>of</strong> the desert climate,<br />

remains diverse and abundant despite years<br />

<strong>of</strong> cattle ranching. 14<br />

Despite its great beauty, the desert presents major<br />

challenges to those who are unaccustomed to its<br />

extremes. Summer heat, winter cold, long distances<br />

between sources <strong>of</strong> water, poisonous wildlife, wild<br />

animals, rough terrain, and vast areas <strong>of</strong> isolated<br />

country pose serious risks to those who try to travel<br />

over the Reservation on foot.<br />

Crisis on the Border<br />

Until recently, the Desert People were free to<br />

travel back and forth between Mexico and the<br />

Reservation to visit family members and to take part<br />

in ceremonies and celebrations. Recently however,<br />

robust enforcement makes cross-border travel difficult.<br />

Whereas, stronger border security inconveniences<br />

tribal members who travel back and forth<br />

between Mexico and the U.S. legally, thousands<br />

<strong>of</strong> immigrants from Mexico use the isolation <strong>of</strong> the<br />

Reservation to avoid detection to cross illegally into<br />

the U.S. According to the Tohono O’odham Police,<br />

as many as 1,500 people from Mexico pass through<br />

the Reservation every day. 15 Furthermore, since<br />

2000, the U.S. Border Patrol has investigated 1,156<br />

deaths <strong>of</strong> illegal migrants that have occurred on the<br />

Reservation as a result <strong>of</strong> the harsh remoteness <strong>of</strong><br />

the environment. 16 These deaths have placed immense<br />

psychological, social, and financial burdens<br />

on the Desert People.<br />

Over the last decade, there have been several incursions<br />

into the Reservation by people dressed<br />

in Mexican uniforms. In March 1999, Homeland<br />

Security personnel were fired on by personnel wearing<br />

Mexican military uniforms who were smuggling<br />

illegal drugs into the U.S. In April 2000, a cattle<br />

truck drove into the village <strong>of</strong> Menager’s Dam on<br />

the O’odham Reservation carrying men wearing<br />

Mexican military uniforms and armed with machine<br />

guns. In January 2002, two men, dressed as<br />

Mexican soldiers, crashed into a car and killed two<br />

innocent people while smuggling drugs through the<br />

Reservation. Later in May 2002, a Tohono O’odham<br />

40 <strong>Military</strong> <strong>Intelligence</strong>


Nation Ranger was pursued by men wearing Mexican<br />

military uniforms and driving a military vehicle. 17<br />

Impacts <strong>of</strong> Illegal Immigration on the<br />

Reservation<br />

Through no fault <strong>of</strong> their own, the Desert People<br />

are now caught in the middle <strong>of</strong> an immense crisis<br />

created by decisions made long ago and exacerbated<br />

by perceptions <strong>of</strong> wealth and opportunity<br />

in the U.S. relative to the poverty and deprivation<br />

that is <strong>of</strong>ten synonymous with life in Mexico.<br />

Furthermore, illegal immigration and drug smuggling<br />

on the Reservation directly threaten the best<br />

efforts <strong>of</strong> the Tohono O’odham to preserve their traditional<br />

culture and way-<strong>of</strong>-life.<br />

Many illegal immigrants who come from Mexico<br />

to the Reservation arrive in need <strong>of</strong> water, food, and<br />

medical attention. The humanitarian needs <strong>of</strong> these<br />

people cannot be ignored by the Tohono O’odham<br />

who must, by tradition, help others in need. On the<br />

other hand, tribal members do not want to be arrested<br />

for aiding illegal immigrants. Because <strong>of</strong> these<br />

and other similar problems, Tribal Chairman, Ned<br />

Norris, stresses the need for better communications<br />

and consultation between O’odham leaders<br />

and federal <strong>of</strong>ficials. Though cooperation between<br />

the tribal and federal government is evident, and<br />

despite efforts by the U.S. Border Patrol to improve<br />

relations with the O’odham nation, many tribal<br />

members believe the U.S. Department <strong>of</strong> Homeland<br />

Security (DHS) should show greater concern for the<br />

sovereignty <strong>of</strong> the Tohono O’odham Nation. 18<br />

Large numbers <strong>of</strong> illegal immigrants have resulted<br />

in increased levels <strong>of</strong> crime on the Reservation.<br />

During March 2008 alone, an estimated 15,500 illegal<br />

immigrants entered the Reservation. 19 The<br />

Desert People now find it necessary to secure their<br />

homes because immigrants have stolen food, clothing<br />

and other possessions. Sometimes, people<br />

find undocumented immigrants sleeping on their<br />

porches or in outbuildings near their homes. Until<br />

recently, people who lived on the Reservation were<br />

able to walk through the desert without fear. Now<br />

they have found it increasingly necessary to take<br />

personal security measures in order to protect their<br />

families and their possessions.<br />

Although these problems are immense, one <strong>of</strong><br />

the most damaging ramifications <strong>of</strong> human and<br />

drug smuggling on the Reservation is the instant<br />

wealth that smugglers <strong>of</strong>fer to people who have<br />

lived in poverty and deprivation for generations.<br />

The lure <strong>of</strong> tax free dollars in exchange for transportation,<br />

food, water, and shelter has led some<br />

tribal members (especially the young) to participate<br />

in smuggling. Additionally, for humanitarian<br />

reasons, some people have established water<br />

stations along well-travelled routes through the<br />

Reservation. Whereas these stations save lives,<br />

they also draw illegal migrants and smugglers.<br />

Water stations are a contentious issue on the<br />

Reservation, and families are sometimes torn<br />

apart by differences <strong>of</strong> opinion over interaction<br />

with illegal migrants and smugglers.<br />

The Tohono O’odham value privacy and do not<br />

welcome intrusions by outsiders. The smuggling<br />

<strong>of</strong> large numbers <strong>of</strong> people and drugs now brings<br />

hundreds <strong>of</strong> law enforcement personnel to the<br />

Reservation. As Border Patrol agents and employees<br />

<strong>of</strong> other agencies attempt to apprehend undocumented<br />

migrants and drug smugglers, they <strong>of</strong>ten<br />

find it necessary to intrude on the private lives <strong>of</strong><br />

the Desert People. Additionally, most <strong>of</strong> the authorities<br />

who are assigned to work on the Reservation<br />

have not studied the nature <strong>of</strong> O’odham culture,<br />

values, attitudes and beliefs. Sometimes, this lack<br />

<strong>of</strong> knowledge leads to misunderstandings and tense<br />

encounters.<br />

Costs <strong>of</strong> Illegal Immigration<br />

Illegal immigrants leave more than 2,000 tons <strong>of</strong><br />

cast-<strong>of</strong>f bottles, clothing, back packs, and human<br />

waste on the Reservation each year. This trash is<br />

more than merely an eyesore; it is hazardous to<br />

wildlife, domestic animals, and local residents. The<br />

Tohono O’odham Nation now finds it necessary to<br />

spend thousands <strong>of</strong> dollars each year to remove this<br />

garbage. Furthermore, those who live in the small<br />

villages and ranches scattered over the Reservation<br />

are also forced to haul away truck loads <strong>of</strong> garbage<br />

and waste left near their homes. 20<br />

In 2003, the Tohono O’odham Nation spent more<br />

than three million dollars to combat illegal immigration<br />

and smuggling and these costs have continued<br />

to escalate. This, however, is not the only potentially<br />

disastrous ramification <strong>of</strong> illegal immigration and<br />

smuggling. The involvement <strong>of</strong> some tribal members<br />

in these activities seriously complicates the<br />

Nation’s long term commitment to the preservation<br />

<strong>of</strong> the Tohono O’odham culture. Smugglers are will-<br />

April - June 2009 41


ing to pay local people as much as $1,500 per person<br />

to drive illegal immigrants from the Reservation<br />

to the Phoenix metropolitan area. They also pay for<br />

storage, food, water, shelter, and the transportation<br />

<strong>of</strong> illegal narcotics. A person who has access<br />

to a six passenger vehicle could receive more than<br />

$7,000.00 (tax free) for making an eight hour round<br />

trip. For many people who live on the Reservation,<br />

that is a lot <strong>of</strong> money. While no one knows the exact<br />

amount <strong>of</strong> personal income that comes to some<br />

tribal members as a result <strong>of</strong> providing these services,<br />

one study found that the annual total may<br />

exceed $13,795,000. 21<br />

The Desert People live in close-knit communities.<br />

For them, the participation <strong>of</strong> tribal members<br />

in smuggling and other such activities presents<br />

an immense challenge because the Tribal Police<br />

are sometimes called upon to arrest people who<br />

they know very well. Even so, they work closely<br />

with federal, state, and county authorities to enforce<br />

the law and stem the flow <strong>of</strong> illegal migrants<br />

and smuggling on the Reservation. 22<br />

During fiscal year 2002, the Tohono O’odham<br />

Nation was forced to spend nearly $7,000,000 to<br />

deal with the manifestations <strong>of</strong> illegal migration.<br />

During this period, 85 illegal immigrants died on<br />

the Reservation causing $266,050 to be spent on<br />

autopsies and other related costs. At the same<br />

time, Tribal Police dealt with 140 drug smuggling<br />

cases at a cost <strong>of</strong> $642,880; twelve immigrant related<br />

homicides costing $260,000 to investigate;<br />

towed nearly 4,000 abandoned immigrant vehicles<br />

at a cost <strong>of</strong> $180,000, and provided medical<br />

emergency treatment to immigrants at a cost <strong>of</strong><br />

more than $500,000. 23<br />

Although the Tohono O’odham Nation receives<br />

some assistance from the federal government,<br />

the massive numbers <strong>of</strong> illegal entrants to the<br />

Reservation have made it necessary for the Desert<br />

People to divert scarce resources from other pressing<br />

needs including support to schools, economic<br />

development, and infrastructure improvements.<br />

Law Enforcement Issues<br />

While most tribal members want to put an end to<br />

crime on the Reservation, many are uncomfortable<br />

with the presence <strong>of</strong> large numbers <strong>of</strong> non-O’odham<br />

law enforcement personnel in their communities.<br />

Tribal members tell their leaders that some-<br />

times they are inconvenienced, or even harassed<br />

by these personnel. They also point out that many<br />

federal law enforcement <strong>of</strong>ficers and agents seem to<br />

know little about the traditional ways <strong>of</strong> the Desert<br />

People. They call upon the Federal Government and<br />

other governments to respect the sovereignty <strong>of</strong> the<br />

Tohono O’odham Nation. 24<br />

Tribal Chairman, Ned Norris, Jr., in written testimony<br />

to a Joint Subcommittee <strong>of</strong> the U.S. House<br />

<strong>of</strong> Representatives in April 2008, noted that the<br />

Tohono O’odham Nation has worked closely with<br />

the U.S. Customs and Border Protection to find alternatives<br />

to walls along the border. He argues that<br />

viable alternatives include vehicle barriers, towers,<br />

check-points, and camera-radar systems. He believes<br />

that these methods can effectively improve<br />

security without causing the environmental damage<br />

and personal inconveniences associated with<br />

the construction <strong>of</strong> a wall. The Tohono O’odham are<br />

particularly concerned about the impacts <strong>of</strong> a border<br />

wall on migratory wildlife such as the Mexican<br />

jaguar. Chairman Norris now calls upon the federal<br />

government to repeal the authority given to the<br />

Secretary <strong>of</strong> Homeland Security to wave the limitations<br />

<strong>of</strong> the Environmental Protection Act in the interests<br />

<strong>of</strong> security. 25<br />

In recent years, the Border Patrol has sought to expose<br />

agents who patrol on the Reservation to Tohono<br />

O’odham culture. It also employs a community relations<br />

<strong>of</strong>ficer who works closely with tribal members<br />

to insure effective communications. 26 Nevertheless,<br />

the training that most Border Patrol personnel receive<br />

about the culture <strong>of</strong> the Desert People remains<br />

fairly light. Given the complex nature <strong>of</strong> the current<br />

situation, it is clear that law enforcement personnel<br />

assigned to work on the Reservation would benefit<br />

from training designed to immerse them in the traditions,<br />

values, attitudes, and beliefs <strong>of</strong> the Desert<br />

People.<br />

Initiatives to Deal with Illegal<br />

Immigration and Smuggling<br />

Tribal police, as well as federal and state law enforcement<br />

agencies, are making strides in finding<br />

effective ways to stop the flow <strong>of</strong> illegal migrants and<br />

drugs through the Reservation. Among the more<br />

important <strong>of</strong> these initiatives are the employment<br />

<strong>of</strong> Native <strong>American</strong> ‘Shadow Wolf’ trackers, and the<br />

training <strong>of</strong> law enforcement personnel in the gathering,<br />

analysis and use <strong>of</strong> actionable intelligence by<br />

42 <strong>Military</strong> <strong>Intelligence</strong>


the Directorate <strong>of</strong> <strong>Intelligence</strong> Support to Homeland<br />

Security (DISHLS), U.S. Army <strong>Intelligence</strong> Center<br />

(USAIC), at Fort Huachuca, Arizona.<br />

The Shadow Wolves<br />

Although high-tech intelligence and tracking<br />

techniques are employed in order to capture illegal<br />

immigrants and smugglers on the Reservation, the<br />

Shadow Wolves effectively employ low-tech procedures<br />

and techniques. These federal agents are a<br />

Native <strong>American</strong> group <strong>of</strong> interdiction specialists,<br />

who work under U.S. Immigration and Customs<br />

Enforcement (ICE), within the DHS, using their<br />

highly honed tracking skills to find and apprehend<br />

drug smugglers operating on the Reservation.<br />

During the first six months <strong>of</strong> 2007, the Shadow<br />

Wolves seized almost 50,000 pounds <strong>of</strong> marijuana<br />

on the Reservation. In addition to putting their<br />

tracking skills to work, they also train other U.S law<br />

enforcement agents as well as border guards from<br />

other nations including Lithuania, Latvia, Tajikistan,<br />

Uzbekistan, Kazakhstan, and Macedonia. 27<br />

Cultural Awareness and <strong>Intelligence</strong><br />

Training<br />

The ongoing war against terrorism in the Middle<br />

East has brought about increasingly sophisticated<br />

intelligence capabilities, more effective training<br />

strategies and techniques, and an expanding emphasis<br />

on cultural awareness training and education<br />

within the U.S. military. Although the Tohono<br />

O’odham are loyal U.S. citizens, they are strongly<br />

committed to the preservation <strong>of</strong> their culture and<br />

language, and they think <strong>of</strong> the Reservation as a<br />

sacred homeland. Non-O’odham law enforcement<br />

personnel assigned to work on the Reservation<br />

should receive cultural awareness training that is<br />

at least as robust as the training given to members<br />

<strong>of</strong> the U.S. Armed Forces who are stationed in Iraq<br />

and Afghanistan. USAIC has been at the forefront<br />

in the development and delivery <strong>of</strong> cultural awareness<br />

training for the military.<br />

For six years USAIC, through DISHLS, has provided<br />

basic and advanced intelligence training and<br />

education for personnel from a variety <strong>of</strong> agencies<br />

associated with the DHS mission. DISHLS has provided<br />

specialized training via mobile training teams<br />

(MTTs) including courses on terrorism and counterterrorism,<br />

the reporting <strong>of</strong> intelligence data, intelligence<br />

preparation <strong>of</strong> the operational environment,<br />

combating terrorism, interviewing techniques, interrogation,<br />

and effective report writing.<br />

DISHLS has made courses available to U.S. Border<br />

Patrol and other law enforcement agencies in a variety<br />

<strong>of</strong> locations throughout the U.S. and provided<br />

training to personnel attached to the Tucson Sector<br />

<strong>of</strong> the U.S. Border Patrol, charged with protecting<br />

the border from the Eastern Yuma County to the<br />

Arizona/New Mexico boundary.<br />

Tucson Sector<br />

In addition to providing intelligence training<br />

through MTTs, DISHLS is currently striving to supplement<br />

traditional intelligence training with appropriately<br />

designed distributed learning (DL) courses<br />

<strong>of</strong>fered through USAIC’s University <strong>of</strong> <strong>Military</strong><br />

<strong>Intelligence</strong> (UMI). The Directorate is also working<br />

with Cochise College and other institutions <strong>of</strong> higher<br />

learning (including the Tohono O’odham Nation’s<br />

Community College) to gain college credits for many<br />

<strong>of</strong> these courses. Available supplemental courses<br />

include writing and critical thinking. Additionally,<br />

UMI is currently developing DL courses on the importance<br />

<strong>of</strong> culture and intelligence.<br />

It is increasingly evident that securing the nation’s<br />

borders is dependent on the robust collection<br />

<strong>of</strong> information, effective analysis and the insightful<br />

application <strong>of</strong> the resultant intelligence. In order<br />

to do this, all law enforcement personnel who<br />

work along the border (as well as local residents)<br />

should be trained to concisely report observations<br />

that could provide a tactical advantage to tribal<br />

and other <strong>of</strong>ficials charged with bringing smuggling<br />

and illegal immigration on the Reservation<br />

April - June 2009 43


under control. In keeping with this concept, the<br />

DISHLS and UMI are working to provide access to<br />

such training and education to appropriate tribal,<br />

community, county, and federal personnel. This<br />

initiative is designed to increase the cost effectiveness<br />

and timeliness <strong>of</strong> homeland security training<br />

and education, and rests upon the current federal<br />

mandate to all branches <strong>of</strong> government to share<br />

information and resources wherever and whenever<br />

possible.<br />

Securing the Reservation Border<br />

Although there is, as yet, insufficient data available<br />

to definitively state that illegal immigration from<br />

Mexico into the U.S. is in a long term decline, Leslie<br />

Fulbright (San Francisco Chronicle), reported in<br />

October 2008 that the numbers <strong>of</strong> illegal immigrants<br />

have decreased in response to a slowing U.S. economy<br />

and more effective border security measures. 28<br />

Ronald J. Hansen (The Arizona Republic) stated that<br />

illegal immigration in the U.S. has dropped by about<br />

eleven percent over the last year. He attributes this<br />

to the slowing <strong>American</strong> economy and the stepped<br />

up efforts <strong>of</strong> the Border Patrol. 29<br />

Despite these reports however, there has yet to<br />

be a noticeable decline in the social and economic<br />

costs <strong>of</strong> smuggling and illegal immigration on the<br />

Reservation. Tribal, state, and federal personnel<br />

continue to find enforcement <strong>of</strong> the 78 mile Tohono<br />

O’odham border with Mexico a daunting challenge<br />

and continue to seek effective and efficient intelligence<br />

training opportunities through which they<br />

can enhance their abilities to collect, process, and<br />

apply intelligence to their vital homeland security<br />

mission.<br />

Conclusion<br />

The creation <strong>of</strong> the border between Mexico and the<br />

U.S. caused many serious, although not immediately<br />

apparent, problems for the Desert People. In<br />

1853, none who signed the Gadsden Treaty could<br />

have foreseen the wave <strong>of</strong> violence and crime that<br />

now characterizes life on the border. Because they<br />

had nothing to do with creating the border in the<br />

first place, the Tohono O’odham have historically<br />

regarded it with ambivalence. In recent decades<br />

however, drug and human smuggling have made it<br />

necessary for federal <strong>of</strong>ficials, including the Border<br />

Patrol, to critically scrutinize roads and communities<br />

throughout the Reservation.<br />

Although the majority <strong>of</strong> the Desert People support<br />

efforts to stop smuggling and illegal immigration<br />

from Mexico into the U.S. through their vast<br />

Reservation, many are <strong>of</strong>ten disconcerted by constant<br />

interaction with non-O’odham law enforcement<br />

personnel. Differences in values, attitudes,<br />

and beliefs sometimes lead to misunderstandings<br />

that are not conducive to effective cooperation between<br />

local tribal members who may have information<br />

that could help build the intelligence base<br />

needed to secure the border.<br />

Gaining the cooperation <strong>of</strong> the Desert People could<br />

be more easily accomplished if they were convinced<br />

that non-O’odham law enforcement personnel understood,<br />

and showed deference to, O’odham ways<br />

and culture. The successful completion <strong>of</strong> a comprehensive<br />

course on the language, history, traditions,<br />

values, and culture <strong>of</strong> the Desert People by all<br />

non-O’odham tasked with securing the Reservation<br />

border with Mexico would be compelling evidence <strong>of</strong><br />

the desire <strong>of</strong> local, state, and federal governments<br />

to work in respectful partnership with the Tohono<br />

O’odham Nation. Such a course could be developed<br />

and <strong>of</strong>fered (some parts <strong>of</strong> it via DL) through a cooperative<br />

venture between USAIC (DISHLS and UMI)<br />

and the Tohono O’odham Community College.<br />

Many tribal members now view with alarm the<br />

numbers <strong>of</strong> O’odham youth who have been recruited<br />

to work for the drug cartels and smugglers. They<br />

know that unless the current invasion is halted,<br />

the Reservation cannot become a prosperous, safe<br />

hearth <strong>of</strong> traditional O’odham culture. An effective,<br />

well planned long term effort to stop illegal immigration<br />

and drug smuggling on the Reservation is<br />

possible if federal, state, and other authorities fully<br />

cooperate and consult with the Tohono O’odham<br />

Nation.<br />

Though the federal government has a moral obligation<br />

to protect the rights <strong>of</strong> all indigenous groups<br />

in the Nation, shielding the Tohono O’odham from<br />

the disastrous consequences <strong>of</strong> smuggling and illegal<br />

immigration is especially important because the<br />

security <strong>of</strong> the Reservation is increasingly linked<br />

to the security <strong>of</strong> the entire U.S. Actionable intelligence<br />

coupled with high quality applied training<br />

and education can do much to assist the tribal police,<br />

Border Patrol and other law enforcement agencies<br />

as they cooperatively endeavor to secure the<br />

border.<br />

44 <strong>Military</strong> <strong>Intelligence</strong>


Endnotes<br />

1. Michael F. Logan, The Lessening Stream: An Environmental<br />

History <strong>of</strong> the Santa Cruz River (Tucson, Arizona: The University <strong>of</strong><br />

Arizona Press, 2000), 15-181.<br />

2. Chris Hawley, Drug Monitor, “Violence Rises on the US/Mexico<br />

Border,” 14 September 2008, at http://mexicomonitor.blogspot.<br />

com/2008/09/drug-monitor-on-violence-on-usmexico.html.<br />

3. House Committee on Homeland Security, Subcommittee on<br />

Investigations, Michael T. McCaul, Chairman, “A Line in the Sand:<br />

Confronting the Threat at the Southwest Border,” 2007 at http://<br />

www.house.gov/sites/members/tx10_mccaul/pdf/Investigaions-<br />

Border-Report.pdf. and Lee Morgan, The Reaper’s Line: Life<br />

and Death on the Mexican Border (Tucson, Arizona: Rio Nuevo<br />

Publishers, 2006), 54-245.<br />

4. Ruth Underhill, The Papago and Pima Indians <strong>of</strong> Arizona (Palmer<br />

Lake, Colorado: The Filter Press, 1979), 1-57.<br />

5. Logan.<br />

6. J.D. Hendricks, Resistance and Collaboration: O’odham Responses<br />

to U.S. Invasion (Long Beach, California: Tiamat Publications, 2004)<br />

at http://www.tiamatpublications.com/docs/Collaboration_and_<br />

Resistance.pdf.<br />

7. Bernard Fontana, Of Earth and Little Rain (Tucson, Arizona: The<br />

University <strong>of</strong> Arizona Press, 1989), 1-40.<br />

8. In general, <strong>American</strong> Indians were not granted <strong>American</strong><br />

citizenship until the Indian Citizenship Act was enacted in 1924.<br />

9. Hendricks.<br />

10. Hendricks.<br />

11. George Van Otten, “A Development Feasibility Study for San Lucy<br />

District,” Department <strong>of</strong> Geography and Public Planning, Northern<br />

Arizona University, 1-18.<br />

12. The Indian Reorganization Act (Wheeler-Howard Act) <strong>of</strong> 1934<br />

called for Indian Nations to establish home rule or tribal governments.<br />

See http://www.maquah.net/Kafkaesque/statutes/IRA-330.html.<br />

13. Peter Blaine, Sr. with Michael S. Adams, Papagos and Politics<br />

(Tucson, Arizona: The Arizona Historical Society Press, 1981),<br />

67-90.<br />

14. William G. McGinnies, “An Overview <strong>of</strong> the Sonoran Desert, An<br />

Essay,” Developed from a Paper, Second Annual Conference <strong>of</strong> the<br />

Consortium <strong>of</strong> Arid Lands Institutions, 4 February 1976, Tucson,<br />

Arizona at http://alic.aric.arizona.edu/sonoran/documents/<br />

mcginnies/McGinnies_overview.html.<br />

15. John Dougherty, High Country News, “One Nation, Under Fire,”<br />

19 February 2007 at http://www.hcn.org/issues/340/16834.<br />

16. Brady McCombs and Eric Volante, Arizona Daily Star, 9<br />

December 2007, “Deadliest Migrant Trail in U.S. is Right on Tucson’s<br />

Doorstep,” A1-A2.<br />

17. National Congress <strong>of</strong> <strong>American</strong> Indians, The Tohono O’odham<br />

Nation and Homeland Security Report, 2003 at http://www.<br />

ncai.org/ncai/resource/agreements/Tohono%20O’Odham%20<br />

Nation%20Law%20Enforcement%20Materials.pdf<br />

18. McCombs and Volante.<br />

19. Ned Norris, Written Testimony to the Subcommittee on<br />

Fisheries, Wildlife and Oceans and Subcommittee on National<br />

Parks, Forests and Public Lands <strong>of</strong> the House Committee on Natural<br />

Resources: Joint Oversight Hearing, Walls and Waivers: Expedited<br />

Construction <strong>of</strong> the Southern Border Wall and Collateral Impacts to<br />

Communities and the Environment, 28 April 2008 at http://www.<br />

tiamatpublications.com/docs/testimony_norris.pdf.<br />

20. Gary Gross, Union Tribune, “Triple Fence along Border Would<br />

Split Indian Nation,” 22 October 2006 at http://www.signonsandiego.<br />

com/news/nation/20061022-9999-1n22tohono.html.<br />

21. Kenneth D. Madsen, “A Nation Across Nations: The Tohono<br />

O’odham and the U.S. Mexico Border,” unpublished doctoral<br />

dissertation, (Tempe, Arizona: Arizona State University, 2005), 139-<br />

176.<br />

22. Ibid.<br />

23. National Congress <strong>of</strong> <strong>American</strong> Indians and the Tohono O’odham<br />

Nation.<br />

24. Madsen.<br />

25. Norris.<br />

26. Jose A. Gonzalez and Cristina Metheney, U.S. Border Patrol<br />

Agents, Personal telephone interview, 9 December 2007.<br />

27. Sylvia Moreno, The Washington Post, “‘Shadow Wolves’ Prowl the<br />

U.S.–Mexico Border,” 6 May 2007 at http://www.washingtonpost.<br />

com/wp-dyn/content/article/2007/05/05/AR2007050500771_<br />

pf.html.<br />

28. Leslie Fulbright, The San Francisco Chronicle, “Illegal Immigration<br />

Slows as Economy Weakens,” 3 October 2008 at http://www.sfgate.<br />

com/c/a/2008/10/02/BAGU139QIL.DTL.<br />

29. Ronald J. Hansen, Arizonal Republic, “Number <strong>of</strong> Illegal Migrants<br />

in Arizona, U.S. Plummets,” 31 July 2008 at http://www.azcentral.<br />

com/news/articles/2008/07/31/20080731immigration0731.html.<br />

George A. Van Otten, PhD is a retired Lieutenant Colonel,<br />

USAR, and graduate <strong>of</strong> the MI Advanced Course and the<br />

Command and General Staff College. He is a pr<strong>of</strong>essor<br />

emeritus at Northern Arizona University and retired Dean<br />

<strong>of</strong> Training for USAIC. Dr. Van Otten holds a BS and MS<br />

in Education from Western Oregon University and PhD in<br />

Geography from Oregon State University. Currently, he is a<br />

Strategic Planner for CACI, working with USAIC’s UMI and<br />

DISHLS.<br />

April - June 2009 45


BCST: The Army’s Premiere Battle Command Systems Collective Task Trainer<br />

by Major Michael Spears<br />

Day three <strong>of</strong> the MRX in the 1st BCT TOC: The Battle Captain remains focused on the CPOF in front <strong>of</strong> him<br />

as battalion events continue to populate his “BCT Events” effort from simulated, subordinate battalions. The<br />

Fire Support Cell shouts out, “Acquisition! AO Mustangs!” based on the AFATDS display, which immediately<br />

causes the brigade staff to execute its Indirect Fire Battle Drill. In the White Cell room, a “puckster” continues<br />

to provide event injects (events and reports) from his BCST computer into the brigade ABCS network . . .<br />

Introduction<br />

The introduction <strong>of</strong> various complex digital Army Battle Command Systems (ABCS) across the Army over<br />

the past several years has been accompanied by the creation <strong>of</strong> complicated, and <strong>of</strong>ten costly, simulations<br />

programs and specialized applications to stimulate the ABCS boxes. Units required a training capability<br />

to exercise and sustain ABCS skills to ensure user pr<strong>of</strong>iciency and employment <strong>of</strong> the entire ABCS<br />

network. Current simulation programs, such as the Corps Battle Simulation (CBS) and the Joint Combat<br />

and Tactical Simulation (JCATS) serve very useful purposes for major training exercises, but require high<br />

overhead for small unit training purposes. Some <strong>of</strong> this overhead includes external support and extensive<br />

lead time for coordination.<br />

History<br />

As a result <strong>of</strong> unit requests for ABCS stimulation assistance, the National Simulation Center (NSC) initially<br />

developed a low-overhead s<strong>of</strong>tware application, which we know today as the Battle Command Staff<br />

Trainer (BCST). Since its creation, the NSC worked with numerous agencies and program managers to<br />

transition BCST and ensure mutual capability refinement. The Product Director, Common Services, under<br />

direction <strong>of</strong> Program Manager Battle Command, now has responsibility to continue development <strong>of</strong> the<br />

BCST. The U.S. Army Training and Doctrine Command (TRADOC) Capability Manager-Battle Command<br />

(TCM-BC) is responsible for requirements generation and oversight.<br />

Uses<br />

BCST enables units to conduct battle staff training on ABCS command and control systems via internal<br />

resources with minimal setup time and effort and facilitates collective and individual staff training (sustainment<br />

and refresher) for specific sections or entire staffs, from battalion through U.S. Army Service<br />

46 <strong>Military</strong> <strong>Intelligence</strong>


Component Command levels. Significant training opportunities afforded by BCST include: maintain and<br />

improve highly perishable ABCS skills, train new battle staff personnel, apply staff coordination drills, battle<br />

rhythm development and train-up for exercises/events. This s<strong>of</strong>tware also provides an ability to stimulate<br />

the battle staff reactions to friendly and enemy events, as well as planned Master Scenario Events<br />

List (MSEL) injects to initiate staff reactions. BCST should only be used on training networks, never<br />

on real-world operational network. The risk <strong>of</strong> mixed BCST simulated and real-world operational<br />

events is too great!<br />

What BCST is and is Not<br />

BCST is a training program that operates on standard personal computer systems with Micros<strong>of</strong>t<br />

Windows XP and is applicable to both Active and Reserve Component (AC/RC) units, as well as Battle<br />

Command Training Centers (BCTCs). However, this s<strong>of</strong>tware application is not: hardware or computer,<br />

a substitute for ABCS, or a replacement for CBS, JCATS, or other constructive training simulations.<br />

These systems, like BCST, were born <strong>of</strong> necessity and serve a very useful purpose for larger-scale training<br />

exercises.<br />

How Units Receive BCST<br />

Currently, BCST is provided to Army units through unit set fielding (USF) beginning in December<br />

2008 or via the BCST AKO download site. Based on the approved USF schedule for AC/RC/National<br />

Guard units, the s<strong>of</strong>tware fielding and new equipment training (NET) dates are synchronized with<br />

the unit’s input. The computer discs issued during NET include the actual BCST program, as well<br />

as a reference disc that includes training support packages (TSPs) with specific scenarios. Units that<br />

have recently completed USF and ABCS NET may download the BCST program and TSPs from AKO at<br />

https://www.us.army.mil/suite/kc/10244567.*<br />

BCST NET<br />

Prior to BCST NET, units should receive all ABCS equipment and complete NET for those systems.<br />

During BCST NET, select personnel from the S/G-3 and S/G-6 will receive instruction on how to connect<br />

the BCST into the ABCS network, BCST operator training, and exercise scenario skills. Additionally<br />

BCTCs and Centers <strong>of</strong> Excellence will receive the BCST program and NET based on delivery coordination.<br />

A tiered support apparatus will provide support to units for assistance with the BCST program to resolve<br />

identified issues.<br />

Summary<br />

BCST has tremendous training potential for any Army battle staff, especially at brigade and battalion<br />

levels. BCST provides: a flexible training medium to maintain operators’ pr<strong>of</strong>iciency on their respective<br />

systems; flexible training employment, and great resources for quality collective training at<br />

no cost to the unit. Additionally, this capability enhances and complements BCTC supported events<br />

and exercises. The application and references provide a low-overhead training capability package that<br />

commanders, staff sections, or institutions, can use to train on ABCS system-<strong>of</strong>-systems with organic<br />

resources when they choose.<br />

Questions and comments may be directed to: TCM-BC, ATTN: C2 Branch (BCST), 806 Harrison Drive,<br />

Fort Leavenworth, Kansas 66027-2326 or POCs Major Michael Spears at michael.r.spears@us.army.mil,<br />

(913)684-4505 or Mr. Gregory Eddy, at gregory.j.eddy@conus.army.mil, (913) 684-4597 <strong>of</strong> TCM-BC.<br />

Once units have received the s<strong>of</strong>tware, familiarized their units with it, and used it, send suggested improvements<br />

and recommendations for new features to MAJ Spears and/or Mr. Eddy.<br />

Meanwhile, back in the White Cell room, the BCST operator checks his MSEL, and initiates an event<br />

that stimulates the DCGS-A box, as the brigade staff continues to execute their staff coordination and<br />

battle drills . . .<br />

*AKO users will request access to this site from the BCST POCs.<br />

April - June 2009 47


Introduction<br />

One <strong>of</strong> the most important functions during operations<br />

is assessment–determining if the operations<br />

are achieving the tasks and purposes that are intended.<br />

The use <strong>of</strong> three different constructs assist<br />

in assessment: indicators, measures <strong>of</strong> performance,<br />

and measures <strong>of</strong> effectiveness. Understanding these<br />

constructs and their use is critical to determine if<br />

operations are focused on the desired end state.<br />

The purpose for this article is to describe in detail<br />

two <strong>of</strong> these concepts: measures <strong>of</strong> performance<br />

and measures <strong>of</strong> effectiveness. Indicators are an important<br />

construct, but most intelligence pr<strong>of</strong>essionals<br />

are familiar with indicators–items <strong>of</strong> information<br />

that are measurable, collectable, and relevant to<br />

give insight into a measure <strong>of</strong> effectiveness or measure<br />

<strong>of</strong> performance. 1<br />

MOP and MOE Joint Doctrine<br />

Joint Publication (JP) 3-0, Joint Operations and<br />

JP 5-0, Joint Operation Planning provide an explanation<br />

<strong>of</strong> the terms measure <strong>of</strong> performance and<br />

measure <strong>of</strong> effectiveness. The following are the definitions<br />

from JP 5-0:<br />

Measure <strong>of</strong> Performance (MOP): A criterion used<br />

to assess friendly actions that are tied to measuring<br />

task accomplishment.<br />

Measure <strong>of</strong> Effectiveness (MOE): A criterion used<br />

to assess changes in system behavior, capability, or<br />

operational environment that is tied to measuring<br />

the attainment <strong>of</strong> an end state, achievement <strong>of</strong> an<br />

objective, or creation <strong>of</strong> an effect. 2<br />

JP 5-0 also provides an explanatory chart that<br />

provides some clarity to the concepts <strong>of</strong> MOP and<br />

MOE and how they interrelate. 3<br />

by Colonel Jack D. Kem, PhD, U.S. Army, Retired<br />

The views expressed in this article are those <strong>of</strong> the author and do not reflect the <strong>of</strong>ficial policy or position <strong>of</strong> the<br />

Departments <strong>of</strong> the Army and Defense, or the U.S. Government.<br />

Level<br />

National<br />

Strategic<br />

Theater<br />

Strategic<br />

Operational<br />

ASSESSMENT LEVELS AND MEASURES<br />

End State and<br />

Objectives<br />

-End State & Mission<br />

-Objectives<br />

-E�ects<br />

-Tasks<br />

-Mission<br />

-Objectives<br />

-E�ects<br />

-Tasks<br />

-Mission<br />

-Objectives<br />

-Tasks<br />

It is important to note that MOPs relate to the<br />

tasks being performed with the question “Are we<br />

doing things right?” MOEs relate to the effects and<br />

objectives with the question “Are we doing the right<br />

things?” JP 5-0 states that “MOPs are closely associated<br />

with task accomplishment” whereas MOEs<br />

“measure the attainment <strong>of</strong> an end state, achievement<br />

<strong>of</strong> an objective, or creation <strong>of</strong> an effect; they do<br />

not measure task performance.” 4<br />

MOP and MOE–Army Doctrine<br />

Field Manual (FM) 3-0, Operations, provides a similar<br />

explanation <strong>of</strong> the terms MOP and MOE. FM 3-0<br />

states that “measures <strong>of</strong> performance answer the<br />

question, “Was the task or action performed as the<br />

commander intended?” A measure <strong>of</strong> performance<br />

confirms or denies that a task has been properly<br />

performed.” For MOEs, FM 3-0 states “measures <strong>of</strong><br />

effectiveness focus on the results or consequences<br />

<strong>of</strong> actions taken. They answer the question, ‘Is the<br />

force doing the right things, or are additional or<br />

alternative actions required?’ A measure <strong>of</strong> effectiveness<br />

provides a benchmark against which the<br />

48 <strong>Military</strong> <strong>Intelligence</strong><br />

Tactical<br />

Guidance<br />

Assessed using measures <strong>of</strong><br />

e�ectiveness -- MOEs<br />

(Are we doing the right things?)<br />

Assessed using measures <strong>of</strong><br />

performance -- MOPs<br />

(Are we doing the right things?)<br />

Battle Damage<br />

Assessment<br />

Reattack or<br />

Future Targeting<br />

Combat tasks<br />

(particularly �res)<br />

use Combat Assessment<br />

Munitions E�ectiveness<br />

Assessment


commander assesses progress toward accomplishing<br />

the mission.” 5<br />

FM 3-07, Stability Operations, provides a more explicit<br />

definition <strong>of</strong> the concepts <strong>of</strong> MOP and MOE:<br />

MOP: A measure <strong>of</strong> performance is a criterion<br />

used to assess friendly actions that is tied to measuring<br />

task accomplishment (JP 3-0). At the most<br />

basic level, every Soldier assigned a task maintains<br />

a formal or informal checklist to track task completion.<br />

The items on that checklist are measures<br />

<strong>of</strong> performance. At battalion level and above, command<br />

posts monitor measures <strong>of</strong> performance for<br />

assigned tasks. Examples <strong>of</strong> measures <strong>of</strong> performance<br />

include the construction <strong>of</strong> a training facility<br />

for host-nation security forces or an increased border<br />

presence by friendly forces. 6<br />

MOE: A measure <strong>of</strong> effectiveness is a criterion<br />

used to assess changes in system behavior, capability,<br />

or operational environment that is tied to measuring<br />

the attainment <strong>of</strong> an end state, achievement<br />

<strong>of</strong> an objective, or creation <strong>of</strong> an effect (JP 3-0). They<br />

focus on the results or consequences <strong>of</strong> task execution<br />

and provide information that guides decisions<br />

to take additional or alternate actions. Examples <strong>of</strong><br />

measures <strong>of</strong> effectiveness include reduced insurgent<br />

activity, reduced inflation rates, and improvements<br />

in agricultural production. 7<br />

FM 3-07 also provides an excellent description<br />

and example <strong>of</strong> how indicators are used to assess<br />

MOPs and MOEs.<br />

Indicator: An indicator is an item <strong>of</strong> information<br />

that provides insight into a measure <strong>of</strong> effectiveness<br />

or measure <strong>of</strong> performance. Indicators use available<br />

information to inform a specific measure <strong>of</strong> performance<br />

or measure <strong>of</strong> effectiveness. A single indicator<br />

can inform multiple measures <strong>of</strong> performance<br />

and measures <strong>of</strong> effectiveness. Valid indicators are<br />

measurable, collectable, and relevant to a specific<br />

time. Examples <strong>of</strong> indicators include bushels <strong>of</strong> apples<br />

sold in a specific market in the past month,<br />

number <strong>of</strong> escalation <strong>of</strong> force incidents along a given<br />

route in the past 90 days, and number <strong>of</strong> bridges repaired<br />

in a province.<br />

MOP and MOE–Relating the Concepts<br />

One useful way to think <strong>of</strong> MOPs and MOEs is to<br />

think <strong>of</strong> them in terms <strong>of</strong> task and purpose. MOPs<br />

relate to accomplishment <strong>of</strong> the task and MOEs relate<br />

to the accomplishment <strong>of</strong> the purpose. For ex-<br />

ample, a unit may be given the task and purpose <strong>of</strong><br />

occupying a hill in order to provide early warning.<br />

The task <strong>of</strong> occupying the hill expertly executed; the<br />

accomplishment <strong>of</strong> this task provides a MOP. If the<br />

occupation <strong>of</strong> the hill does not provide early warning,<br />

or doesn’t achieve the intended purpose for the<br />

occupation, this is reflected as in a MOE.<br />

Another example is that a unit may be tasked to<br />

conduct at least ten patrols a day in a neighborhood<br />

in order to gain the confidence <strong>of</strong> the local populace.<br />

Even though the unit might conduct the requisite<br />

number <strong>of</strong> patrols to standard, it still may not result<br />

in confidence. From a MOP standpoint, the unit is<br />

successful; from an MOE standpoint, it may not be.<br />

As a result, MOP could easily be considered more<br />

<strong>of</strong> a quantitative measure, while MOE tends to be a<br />

qualitative measure.<br />

The focus for MOP is primarily internal, answering<br />

the question “Are we doing what we are told to<br />

do?” MOE may have an external focus, answering<br />

the question “Do our actions have the effect on others<br />

that we are expecting?<br />

The chart below illustrates a comparison <strong>of</strong> the<br />

concepts <strong>of</strong> MOP and MOE and how they relate to<br />

task and purpose, quantitative vs. qualitative measures,<br />

internal vs. external focus, and the primary<br />

questions to ask for each measure.<br />

Relationship to Task<br />

& Purpose<br />

Quantitative vs.<br />

Qualitative Measures<br />

Internal vs. External<br />

Focus<br />

Primary Question<br />

April - June 2009 49<br />

MOP<br />

Relates directly to Task<br />

Primarily Quantitative<br />

Internal Focus (Task at<br />

hand)<br />

Are we doing things<br />

right? (Are we<br />

accomplishing the task<br />

to standard?)<br />

MOE<br />

Relates directly to Purpose<br />

Primarily Qualitative<br />

External Focus (Impact <strong>of</strong><br />

Actions)<br />

Are we doing the right<br />

things? (Are the things we<br />

are doing getting us to the<br />

end state we want?)<br />

MOP and MOE–Examples from Operations<br />

Using MOP and MOE for assessment does not just<br />

apply to combat operations. The concepts also easily<br />

apply to stability operations and to support to<br />

civil authorities. In stability operations, there may<br />

be a number <strong>of</strong> objectives that easily translate into<br />

MOP and MOE measures. For example, if a line <strong>of</strong><br />

effort in a stability operation is the establishment


<strong>of</strong> the rule <strong>of</strong> law, there will be a number <strong>of</strong> tasks<br />

that are given to units to support the legal system<br />

in a region. The task and purpose for a unit could<br />

be stated in such a way: Establish/fund judicial<br />

training institutes in order to establish civilian trust<br />

in the legitimacy <strong>of</strong> the judiciary system and to further<br />

the establishment <strong>of</strong> the rule <strong>of</strong> law that fosters<br />

the confidence <strong>of</strong> the people in the legal and judicial<br />

systems.<br />

In this case, the MOP and MOE could be:<br />

MOPs: Numbers <strong>of</strong> judicial training institutes<br />

established.<br />

Amount <strong>of</strong> funding contributed for<br />

institutes.<br />

Establishment <strong>of</strong> accreditation agency for<br />

law schools.<br />

MOEs: Increase in public trust in the judiciary<br />

system.<br />

Increase in confidence in the legal and<br />

judicial systems.<br />

Another example from a support to civil authorities<br />

mission could be in support <strong>of</strong> a line <strong>of</strong> effort<br />

for public health and medical services. The task<br />

and purpose for a unit could be stated in such a<br />

way: Re-establish public health and medical services<br />

in order to remove disease threat to save lives,<br />

mitigate human suffering and restore critical services<br />

and to enable the transfer <strong>of</strong> DOD relief operations<br />

to civil authorities.<br />

In this case, the MOP and MOE could be:<br />

MOPs: Number <strong>of</strong> patients treated.<br />

Number <strong>of</strong> hospitals operational.<br />

Number <strong>of</strong> vaccines administered.<br />

MOEs: Decrease in disease threat.<br />

Restoration <strong>of</strong> critical services in the<br />

community.<br />

Increased ability <strong>of</strong> civil authorities to<br />

respond.<br />

In both <strong>of</strong> these cases, the MOPs relate to the<br />

task, are primarily quantitative measures, and are<br />

focused on the internal actions <strong>of</strong> the unit. MOEs,<br />

on the other hand, relate to the purpose, are primarily<br />

qualitative measures, and are focused on the<br />

external effects that result from the unit’s actions.<br />

Conclusion<br />

Understanding how to apply MOPs and MOEs<br />

for assessments is a critical task in both planning<br />

and during operations. JP 3-0 provides the following<br />

summary: Assessment is a process that measures<br />

progress <strong>of</strong> the joint force toward mission<br />

accomplishment. The assessment process begins<br />

during mission analysis when the commander and<br />

staff consider what to measure and how to measure<br />

it to determine progress toward accomplishing<br />

a task, creating an effect, or achieving an<br />

objective. The assessment process uses measures<br />

<strong>of</strong> performance to evaluate task performance at<br />

all levels <strong>of</strong> war and measures <strong>of</strong> effectiveness to<br />

measure effects and determine the progress <strong>of</strong> operations<br />

toward achieving objectives. 8<br />

Selecting appropriate MOPs and MOEs–and relating<br />

them to task and purpose–can ensure that<br />

actions are focused on the desired end state.<br />

Endnotes<br />

1. FM 3-07, Stability Operations, 6 October 2008, 4-69.<br />

2. JP 5-0, Joint Operation Planning, 26 December 2006, III-61.<br />

3. Ibid., III-60.<br />

4. Ibid., III-60 – 61.<br />

5. FM 3-0, Operations, 13 February 2008, 5-86 through 5-87.<br />

6. FM 3-07, 4-67.<br />

7. Ibid., 4-68.<br />

8. JP 3-0, Joint Operations, 17 September 2006, xxi.<br />

Colonel (Retired) Jack D. Kem is a Supervisory Pr<strong>of</strong>essor<br />

in the Department <strong>of</strong> Joint, Interagency, and Multinational<br />

Operations at the U.S. Army Command and General Staff<br />

College, Fort Leavenworth, Kansas. He has served as a<br />

Battalion S2, G2 Plans Officer, DTOC Support Element Chief,<br />

and Battalion XO in the 82d Airborne Division; as a Brigade<br />

S2 in the 3d Infantry Division; as a Company Commander and<br />

Battalion S3 in the 3d Armored Division, and as the Battalion<br />

Commander <strong>of</strong> the 319th MI Battalion, XVIII Airborne Corps.<br />

Colonel Kem graduated from MI Officers’ Advanced Course, the<br />

Army Command and General Staff College, the Air Command<br />

and Staff College, the Joint Forces Staff College, and the<br />

Army War College. He holds a BA from Western Kentucky<br />

University, an MPA from Auburn University at Montgomery,<br />

and a PhD from North Carolina State University. Readers may<br />

contact the author via E-mail at jackie.kem@us.army.mil.<br />

50 <strong>Military</strong> <strong>Intelligence</strong>


trAInInG tHE COrPs<br />

WIT—The Battlefield Commander’s Force<br />

Multiplier in the CIED Fight<br />

Introduction<br />

Weapons <strong>Intelligence</strong> Teams (WITs)<br />

have been a critical asset in the<br />

War on Terrorism and the<br />

counter improvised explosive<br />

device (CIED) fight<br />

since 2004. WITs are consistently<br />

proving their<br />

worth as the battlefield<br />

commander’s resident<br />

technical intelligence expert<br />

and force multiplier.<br />

These teams are filling a<br />

critical gap and providing<br />

timely and actionable intelligence<br />

to the Warfighter.<br />

Their unique skill sets, training,<br />

experience, and equipment<br />

provide commander’s with the capability<br />

to reach out and influence insurgent<br />

networks before they strike against U.S. and<br />

Coalition forces.<br />

We are training these young men and women to<br />

go into harm’s way, to willfully and purposefully expose<br />

themselves to the most dangerous weapon <strong>of</strong><br />

all–an enemy with no regard for human life, an undying<br />

desire to kill us, and the technical means to<br />

succeed at his mission. WITs are helping battlefield<br />

commander’s get at their enemies with unprecedented<br />

success rates. Prosecutions in tribunals and<br />

criminal courts are enjoying much higher conviction<br />

rates thanks in part to evidence and material collected<br />

and exploited by these teams. We are training<br />

and equipping these teams with the singular purpose<br />

<strong>of</strong> defeating this enemy and his weapons “left<br />

<strong>of</strong> the boom,” before he can inflict casualties on us<br />

or our Coalition partners.<br />

In this article I will discuss the history, training,<br />

mission, composition, and future <strong>of</strong> Weapons<br />

<strong>Intelligence</strong> and the teams that conduct it.<br />

by Major Chris Britt<br />

WIT History. A brief look at the history<br />

<strong>of</strong> these teams provides the background<br />

necessary to understand<br />

how they work and why they<br />

are such a critical component<br />

in waging a successful<br />

counterinsurgency (COIN)<br />

campaign. As operations<br />

in Iraq transitioned to<br />

Phase IV, the tactics employed<br />

against Coalition<br />

Forces changed dramatically.<br />

The IED became the<br />

weapon <strong>of</strong> choice against<br />

us and as such “IED” became<br />

a common expression.<br />

Commanders at every level realized<br />

that the IED networks had<br />

to be eliminated. The problem was<br />

that, at that time, there wasn’t an organization<br />

particularly well suited to combat this threat.<br />

As a result, a decision was made that a CIED capability<br />

must be created and fielded as quickly as<br />

possible.<br />

Army leadership at the highest levels took the<br />

lead in the fight against the IED by creating the<br />

Army IED Task Force (TF) in October 2003. It<br />

proved its worth over the following months by reducing<br />

the success rates <strong>of</strong> insurgent IED attacks<br />

despite an overall increase in the total number <strong>of</strong><br />

attacks. In 2004, under the direction <strong>of</strong> Deputy<br />

Secretary <strong>of</strong> Defense Paul D. Wolfowitz, the decision<br />

was made to transform the entity into a Joint<br />

IED TF (JIEDD-TF). In early 2004 JIEDD-TF (now<br />

the Joint IED Defeat Organization (JIEDDO)), the<br />

U.S. Army <strong>Intelligence</strong> and Security Command<br />

(INSCOM), and the Department <strong>of</strong> the Army (DA)<br />

G2 began the process <strong>of</strong> identifying gaps in intelligence<br />

support needed to combat the growing number<br />

<strong>of</strong> insurgent IED networks. The next step was<br />

April - June 2009 51


trAInInG tHE COrPs<br />

to assign responsibilities for the execution <strong>of</strong> training,<br />

equipping, and fielding the resulting teams.<br />

INSCOM tasked the National Ground <strong>Intelligence</strong><br />

Center (NGIC) with developing a workable Concept<br />

<strong>of</strong> Operations to implement a CIED program. NGIC’s<br />

mission analysis led to the recommendation <strong>of</strong> establishing<br />

a Counter IED Targeting Program (CITP).<br />

The CITP would consist <strong>of</strong> three basic cooperating,<br />

but separate, sections: WITs; a forward fusion cell,<br />

and a CONUS based fusion center. The current CITP<br />

mission is to increase the collection <strong>of</strong> technical intelligence<br />

(TECHINT) using WITs and to provide<br />

forward and rear fusion cells producing actionable<br />

intelligence to support the targeting <strong>of</strong> bomb-makers<br />

and their networks.<br />

The first WITs received sixteen days <strong>of</strong> training at<br />

Fort Gordon, Georgia in 2004 and immediately deployed<br />

to Iraq. These initial teams enjoyed limited<br />

success, but more importantly, succeeded in validating<br />

the concept <strong>of</strong> the WIT. Additionally, the teams<br />

were instrumental in getting the word out to battlefield<br />

commanders that they now had a valuable asset<br />

in the CIED fight. The second WIT rotation (Phase<br />

II) was assigned to the 203 rd MI Battalion (TECHINT)<br />

which deployed to Iraq to assume responsibility for<br />

the WIT mission in 2005. Since 2006, WITs have<br />

been made up <strong>of</strong> a combination <strong>of</strong> personnel from<br />

the U.S. Army, Air Force, and Navy.<br />

In June 2006, the U.S. Army <strong>Intelligence</strong> Center<br />

(USAIC) at Fort Huachuca, Arizona was designated<br />

as the proponent for the WIT training mission and<br />

assumed responsibility for the training, development,<br />

and integration <strong>of</strong> weapons technical intelligence<br />

(WTI) in the CIED fight. The first formal Weapons<br />

<strong>Intelligence</strong> course was taught at Fort Huachuca in<br />

September 2008.<br />

WIT Training. WIT training, conducted at the<br />

USAIC, consists <strong>of</strong> fifty-one days <strong>of</strong> instruction divided<br />

between classroom academics, performancebased<br />

practical and laboratory exercises, and a<br />

comprehensive field training exercise. The course<br />

is currently taught three times a year to support<br />

deployment requirements. There are two separate<br />

tracks within the course. The primary track trains<br />

students who will deploy as team members. The secondary<br />

track trains students assigned to the analyst<br />

cell <strong>of</strong> the Weapons <strong>Intelligence</strong> Company (WIC).<br />

All WIT members are trained to the same standard<br />

and every prospective team member must demonstrate<br />

pr<strong>of</strong>iciency in each task before graduating<br />

from the course. Individuals are assigned to a team<br />

upon arrival at the course and in most cases will<br />

train and deploy with that team for the duration <strong>of</strong><br />

their assignment. Team member training content<br />

consists <strong>of</strong> the following broad categories:<br />

Ê Battlefield Forensics: Material collection and preservation;<br />

fingerprint fundamentals and techniques,<br />

and forensic photography.<br />

Ê Media Exploitation/TECHINT Kit: Exploitation <strong>of</strong><br />

captured media and instruction on the use <strong>of</strong> team<br />

equipment.<br />

Ê Weapons <strong>Intelligence</strong>: Scene exploitation; IED<br />

fundamentals; electronics theory; investigation<br />

and questioning, and report writing.<br />

Ê Operational Support Functions: Land navigation;<br />

explosive systems recognition; combat tracker operations;<br />

cultural awareness, and foreign weapons<br />

identification.<br />

52 <strong>Military</strong> <strong>Intelligence</strong>


Training for the analysis cell consists <strong>of</strong> various<br />

intelligence s<strong>of</strong>tware applications; IED fundamentals;<br />

report writing; targeting, and WTI analysis<br />

techniques.<br />

The Weapons <strong>Intelligence</strong> Mission<br />

WITs are small tactical teams that provide WTI<br />

support to Army brigade combat teams (BCTs)<br />

and U.S. Marine Corps regimental combat teams<br />

or other similar elements as required. They are<br />

an intelligence asset that provides both a collection<br />

and an analysis capability at the BCT level.<br />

WITs provide battlefield commanders with a dedicated,<br />

IED related, tactical intelligence collection<br />

and exploitation capability in support <strong>of</strong> targeting<br />

efforts. Commanders may employ WITs at attack<br />

sites (post-blast IED, sniper incidents, etc.) or at<br />

locations where weapons are discovered (pre-blast<br />

IED detected and rendered safe, cache sites, bomb<br />

making facilities, etc.) WITs may also be employed<br />

in other operations such as supporting a raid or<br />

cordon and search by providing in-depth tactical<br />

site exploitation on the objective. As the WIT<br />

concept matures, it becomes more valuable to the<br />

commander. The Weapons <strong>Intelligence</strong> program<br />

was initially focused primarily on the IED threat<br />

but has evolved over the years and is no longer limited<br />

solely to the CIED fight.<br />

Essential tasks and functions include:<br />

ÊÊMove<br />

tactically.<br />

ÊÊConduct<br />

technical collection and exploitation<br />

missions.<br />

ÊÊConduct<br />

media exploitation (including printed<br />

and electronic media.)<br />

ÊÊConduct<br />

WTI analysis.<br />

trAInInG tHE COrPs<br />

ÊÊProduce<br />

intelligence reports and products.<br />

ÊÊCommunicate/disseminate<br />

intelligence to supported<br />

units and higher headquarters.<br />

In addition, WIT provides the following support to<br />

division and higher CIED intelligence efforts:<br />

ÊÊProvide<br />

and inject expert tactical-level reporting<br />

on incident sites into the Theater and<br />

National TECHINT enterprise.<br />

ÊÊPackaging<br />

and delivery <strong>of</strong> evidence/materials<br />

collected at incident sites for more detailed,<br />

higher-level technical exploitation. All material<br />

is collected, tagged, cataloged, transported,<br />

and forwarded according to strict<br />

guidelines that preserve the intelligence and<br />

evidentiary value <strong>of</strong> the materials.<br />

WIT Composition. The Weapons <strong>Intelligence</strong><br />

Company (WIC) deploys in support <strong>of</strong> a Corps or<br />

joint task force (JTF) level headquarters, The current<br />

WIC Headquarters is placed within TF Troy,<br />

supporting the Multi-national Corps-Iraq. It provides<br />

planning and coordination support for the<br />

Corps or JTF staff and exercises technical control<br />

(TECHCON) <strong>of</strong> WTI capabilities (the WI Detachment<br />

and all WITs) supporting the Corps or JTF. The WIC<br />

commander advises the Corps/JTF commander on<br />

task organization, distribution, and employment <strong>of</strong><br />

WTI capabilities, supporting him in the area <strong>of</strong> operations<br />

(AO). The WIC also links the Corps/JTF<br />

commander and staff to the Theater and National<br />

TECHINT enterprise. The company consists <strong>of</strong> up<br />

to fifteen personnel: the WIC commander (0-4); WIC<br />

Executive Officer (0-3); WIC NCOIC (E-9); administrative<br />

specialist (E-6/7); supply specialist (E-6/7);<br />

and eight to ten intelligence analysts (any rank up<br />

to E-7). The analysts receive WIT reports and collected<br />

materials from the teams. They process the<br />

reports, conduct further analysis, and forward intelligence<br />

products to higher headquarters for dissemination<br />

and targeting as required.<br />

The Weapons <strong>Intelligence</strong> Detachment (WID)<br />

deploys to support a division-level headquarters<br />

and normally works directly with the <strong>Intelligence</strong><br />

staff. The WID advises the commander and staff on<br />

task organization, distribution, and employment <strong>of</strong><br />

WTI capability in the division’s AO. It also provides<br />

TECHCON <strong>of</strong> WITs assigned to the division. A critically<br />

important function <strong>of</strong> the WID is to provide<br />

a link for the division’s <strong>Intelligence</strong> staff into the<br />

April - June 2009 53


trAInInG tHE COrPs<br />

Theater and National level TECHINT enterprise. The<br />

WID consists <strong>of</strong> the Detachment Commander (0-3)<br />

and the Detachment NCOIC (E-7).<br />

WITs normally consist <strong>of</strong> five enlisted personnel.<br />

Specific military occupational specialties (MOSs)<br />

may vary between teams but in general have consisted<br />

<strong>of</strong> a combination <strong>of</strong> the following:<br />

Ê The Team Leader is historically a qualified explosive<br />

ordnance disposal (EOD) technician. In<br />

addition to being the Team Leader, he or she<br />

functions as the liaison between the BCT commander<br />

and staff and the WITs higher headquarters.<br />

The Team Leader will also coordinate<br />

with EOD units that provide support in their local<br />

AO.<br />

Ê The senior and junior analysts are <strong>Military</strong><br />

<strong>Intelligence</strong> personnel from the U.S. Army, Air<br />

Force, or Navy. Typically the senior analyst is an<br />

E-5 or E-6 and the junior analyst any rank below<br />

that <strong>of</strong> the senior analyst. There is no specific<br />

<strong>Intelligence</strong> discipline required in order to<br />

be assigned to a team. However, analysts with<br />

strong briefing skills and multi-discipline experience<br />

are preferred and traditionally do better<br />

within the teams.<br />

Ê A combat cameraman or photographer’s mate<br />

brings an in-depth knowledge <strong>of</strong> shot composition,<br />

mid-level photography expertise, and some<br />

limited public affairs experience to the team.<br />

Ê An Army <strong>Military</strong> Police Investigator, Air Force<br />

Office <strong>of</strong> Special Investigations Agent, or a Navy<br />

Master at Arms serves as the team’s law enforcement<br />

expert. They understand crime scene investigation,<br />

evidence preservation, evidentiary<br />

rules and procedures to a greater degree, and<br />

can coordinate with other investigative agencies<br />

when necessary or beneficial to accomplishing<br />

the mission.<br />

Ê The final team member is the combat arms representative.<br />

He contributes to the team by providing<br />

expert tactical analysis <strong>of</strong> incident sites.<br />

The combat arms advisor determines how the<br />

incident was set up and or how the attack was<br />

executed from a tactical point <strong>of</strong> view, records<br />

any changes to enemy tactics, techniques, and<br />

procedures (TTPs), and makes recommendations<br />

on how to counteract any new enemy TTPs.<br />

In order for the team to accomplish its mission,<br />

every member is cross trained in each individual<br />

position. Because every team member has a basic<br />

knowledge and pr<strong>of</strong>iciency in each skill, the Team<br />

Leader is able to divide the team up when necessary.<br />

Team members are expected to train each other on<br />

their unique skill set throughout their tour <strong>of</strong> duty.<br />

Much <strong>of</strong> this training occurs in the forward operating<br />

base between missions. Over the last two years,<br />

many <strong>of</strong> the teams in theater have been required to<br />

conduct split operations in order to support units<br />

within their BCT that are not co-located. Having an<br />

individual team member who can conduct each portion<br />

<strong>of</strong> a successful WIT operation is a definite advantage<br />

to the supported unit.<br />

The Future <strong>of</strong> Weapons <strong>Intelligence</strong><br />

In the summer <strong>of</strong> 2008, the Department <strong>of</strong> Defense<br />

announced that Weapons <strong>Intelligence</strong> would become<br />

an enduring capability, with DA as the Service<br />

proponent. While it’s clear that having teams with<br />

this unique skill set is critical to winning any COIN<br />

fight, there are several issues that still have to be<br />

worked out.<br />

First, WITs don’t technically exist on any unit’s organizational<br />

authorization documents. As a result,<br />

scheduling Soldiers for training, and tracking utilization<br />

<strong>of</strong> the Soldiers trained and equipped to perform<br />

as a WIT is challenging, to say the least. Plans<br />

are underway to create a WIT force structure requirement<br />

at the BCT level which would authorize units<br />

to train Soldiers to fill those positions. Once this requirement<br />

is established, USAIC will be prepared to<br />

conduct periodic classes throughout the year to meet<br />

the requirement for WIT trained Soldiers.<br />

Over the last two years, requests from deploying<br />

units to train their Soldiers have been tremendous.<br />

54 <strong>Military</strong> <strong>Intelligence</strong>


The value <strong>of</strong> an organic WIT capability within the BCT<br />

has finally caught on. At present, there are typically<br />

a few seats in each class that aren’t filled by those<br />

deploying to support one <strong>of</strong> the CIED TFs downrange.<br />

Those seats are <strong>of</strong>fered to deploying units,<br />

the only cost to units is the TDY for their Soldiers. In<br />

the past two years, we have trained teams from the<br />

82 nd Airborne Division, 10 th Mountain Division, 25 th<br />

Infantry Division, 4 th Infantry Division, 1 st Cavalry<br />

Division, and many others.<br />

Secondly, equipment issued to the teams is not<br />

currently in the Army supply system. USAIC is<br />

diligently working to identify equipment requirements<br />

and establish a TECHINT Kit as a program<br />

<strong>of</strong> record so that units can order it as a major enditem<br />

through the standard Army supply system.<br />

Additionally, each component <strong>of</strong> the kit will have its<br />

own national stock number so that it can be easily<br />

replaced. Over the last year we’ve been working<br />

with experts in the fields <strong>of</strong> forensics, law enforcement,<br />

intelligence, and site exploitation (as well as<br />

the associated industries) to assemble a better tool<br />

kit for the teams. The intent was to make the kits<br />

as light and easily transportable as possible while<br />

still equipping the teams with the necessary tools<br />

for the job. Currently, the price <strong>of</strong> each kit has<br />

dropped by almost fifty percent. Keeping cost low<br />

was a huge consideration while designing a kit so<br />

that units could afford it without having to sacrifice<br />

other needed equipment.<br />

Lastly, the WIT does not have assigned MOSs, and<br />

likely will never be assigned them. It does, however,<br />

fit the model for an additional skill identifier (ASI).<br />

USAIC has begun the process for the creation and<br />

trAInInG tHE COrPs<br />

award <strong>of</strong> an ASI to Soldiers trained as WIT members.<br />

Having a WIT ASI will allow the Army to recognize<br />

Soldiers who have graduated from this unique<br />

training, and also allow the Army to assign Soldiers<br />

against WIT coded positions in the future based on<br />

this ASI. With the ASI approved and WIT authorizations<br />

determined for the BCT, it should be a simple<br />

process to assign the right Soldier to the right job.<br />

Conclusion<br />

We are excited about the future <strong>of</strong> the Weapons<br />

<strong>Intelligence</strong> program. Recently completed construction<br />

<strong>of</strong> two specially designed weapons ranges allow<br />

us to conduct live explosives demonstrations<br />

for training purposes. These ranges add realism<br />

to the training and expose students to the realities<br />

<strong>of</strong> IEDs on a practical level. Additionally, we<br />

will teach the next course in a newly renovated<br />

Weapons <strong>Intelligence</strong> Compound separated from<br />

other USAIC instructional facilities. This new compound<br />

will allow us to train all WIT students to a<br />

higher standard in a consolidated and secure atmosphere.<br />

We’ve spent the last eighteen months<br />

updating the training curriculum to ensure it remains<br />

relevant to the CIED fight and WTI needs<br />

<strong>of</strong> the Warfighter. The course is ready to train and<br />

equip the best WITs in the world. Our staff <strong>of</strong> instructors<br />

are dedicated to this mission and united<br />

in providing the most pr<strong>of</strong>essional, realistic, and<br />

relevant training possible.<br />

Major Chris Britt is the Course Manager for the Joint Weapons<br />

<strong>Intelligence</strong> Course. He has served as a Platoon Leader,<br />

Company Executive Officer, Company Commander, Brigade<br />

S6, and ISR Operations Officer.<br />

April - June 2009 55


trAInInG tHE COrPs<br />

01001001001010010010111001010010010100100100101001001001010101010010010010101010100100100101010101001001001010101010010010010101010100100100101010<br />

01010101001001001010010101010010010010100101010100100100101001010101001001001010010101010010010010100101010100100100101001010101001001001010010101<br />

1111101001000100010010000001001001001000100000000000000101001000100100010001000100101000100010101010010010010100100100101001001010010101010101010<br />

01001001001010010010111001010010010100100100101001001001010101010010010010101010100100100101010101001001001010101010010010010101010100100100101010<br />

01010101001001001010010101010010010010100101010100100100101001010101001001001010010101010010010010100101010100100100101001010101001001001010010101<br />

01001001001010010010111001010010010100100100101001001001010101010010010010101010100100100101010101001001001010101010010010010101010100100100101010<br />

01010101001001001010010101010010010010100101010100100100101001010101001001001010010101010010010010100101010100100100101001010101001001001010010101<br />

0001001001001010010000000000000000000111010100101000000000010101110101010010010001001000001000010101010101010000100100101001010001001010001010010<br />

1111101001000100010010000001001001001000100000000000000101001000100100010001000100101000100010101010010010010100100100101001001010010101010101010<br />

01001001001010010010111001010010010100100100101001001001010101010010010010101010100100100101010101001001001010101010010010010101010100100100101010<br />

01010101001001001010010101010010010010100101010100100100101001010101001001001010010101010010010010100101010100100100101001010101001001001010010101<br />

0001001001001010010000000000000000000111010100101000000000010101110101010010010001001000001000010101010101010000100100101001010001001010001010010<br />

The University <strong>of</strong> Arizona<br />

1111101001000100010010000001001001001000100000000000000101001000100100010001000100101000100010101010010010010100100100101001001010010101010101010<br />

Background<br />

How does an organization acquire the skills needed<br />

to develop and conduct training in the high technology<br />

environment <strong>of</strong> today and tomorrow? For some,<br />

the answer may be in contracting or hiring from the<br />

“millennial” generation. While both approaches have<br />

been used successfully at Fort Huachuca, a lesser<br />

known program has been providing Department <strong>of</strong><br />

the Army (DA) civilians these necessary technological<br />

and educational skills for the past ten years.<br />

That program is the “Educational Technology”<br />

plan <strong>of</strong> study <strong>of</strong>fered by the U.S. Army <strong>Intelligence</strong><br />

Center (USAIC) in cooperation with the University <strong>of</strong><br />

Arizona South.<br />

The concept for the program grew from discussions<br />

during 1997-1998 between Dr. Gregory M.<br />

Kreiger, then Dean <strong>of</strong> Continuous Learning, and<br />

Dr. Glenn L. Kjos, Chief <strong>of</strong> the Staff and Faculty<br />

Development Office at the time. Their concern was<br />

that the <strong>Intelligence</strong> Center needed to keep up with<br />

the wave <strong>of</strong> educational technology and, at the same<br />

time, retain the vast experience level <strong>of</strong> the current<br />

work force. The solution they arrived at was to “grow<br />

our own.” They decided, with command support, to<br />

invest in the technological training and education <strong>of</strong><br />

those experienced instructors and training developers<br />

already in the schoolhouse.<br />

Working with Dr. Phil Callahan <strong>of</strong> the University<br />

<strong>of</strong> Arizona South, they came up with a three-year<br />

program <strong>of</strong> study known then as the “Master <strong>of</strong> Arts<br />

in Educational Psychology, Educational Technologies<br />

Emphasis” (today it is simply the “Educational<br />

Technology” program). The curriculum was focused<br />

primarily on the needs <strong>of</strong> the <strong>Intelligence</strong> Center’s<br />

training community, although the program was also<br />

open to members <strong>of</strong> the community.<br />

The Center’s sponsorship <strong>of</strong> the program got<br />

underway in the fall <strong>of</strong> 1998 when 12 DA civil-<br />

by Mr. Richard K. Ward<br />

ians began classes during the evening hours at<br />

the University’s southern campus in Sierra Vista,<br />

Arizona. Sponsorship means that the <strong>Intelligence</strong><br />

Center pays the students’ tuition fees. Students pay<br />

for their books, transportation costs, and incidental<br />

expenses. Sponsored students in the program<br />

usually take two courses per semester for six semesters,<br />

and can, if they stay with it, complete the<br />

program in three years. Courses are conducted in<br />

the evenings and do not conflict with the normal<br />

duty day.<br />

Among the courses taken by the initial students<br />

in the program were: Computer Applications in<br />

Education; Multimedia Applications in Education;<br />

Design <strong>of</strong> Instructional Technologies; Advanced<br />

Design <strong>of</strong> Instructional Technologies; Introduction<br />

to Educational Research; Statistical Methods in<br />

Education; Educational Tests and Measurements;<br />

Learning Theory in Education; Educational<br />

Evaluation, and Theories <strong>of</strong> Human Development.<br />

Program Focus–A Practitioner’s<br />

Approach<br />

The program focused, and still does, on a practitioner’s<br />

approach to the design, development, and<br />

evaluation <strong>of</strong> instructional technology for education<br />

and industry. The program addresses issues related<br />

to learning, instructional design, visual design, multimedia<br />

development, evaluation and research.<br />

What is interesting is the fact that <strong>of</strong> those 12<br />

civilians who started the program in 1998, 10<br />

are still working for the government, and eight <strong>of</strong><br />

those are still at the <strong>Intelligence</strong> Center. The other<br />

two have retired. The government is still getting a<br />

return on its initial investment in the pr<strong>of</strong>essional<br />

development <strong>of</strong> these instructors and training developers<br />

as they apply the technical skills and ed-<br />

56 <strong>Military</strong> <strong>Intelligence</strong>


ucational foundations developed in the program<br />

to their daily work requirements.<br />

At this time, a total <strong>of</strong> 22 DA civilians have taken<br />

advantage <strong>of</strong> this opportunity to enhance their technological<br />

skills and earned a master’s degree in educational<br />

technology as a result. Nineteen are still<br />

government employees. Currently, there are eight<br />

civilians scheduled to continue and/or start the<br />

program in January.<br />

When you ask graduates <strong>of</strong> the program what impact<br />

this opportunity has had on them personally or<br />

in their job performance, their answers reinforce the<br />

original intent <strong>of</strong> the program.<br />

Mr. Leon Leszczynski, an Education Specialist with<br />

the 111 th MI Brigade here at Fort Huachuca, notes<br />

that the program “provided me an opportunity<br />

to ‘retool’ my skills, knowledge, and abilities<br />

to those required by the <strong>Intelligence</strong> Center.”<br />

Further, “this program gave me a solid grasp <strong>of</strong><br />

learning theory and how it relates to instructional<br />

system design and, consequently, I am better able<br />

to advise and assist brigade training developers<br />

and instructors design, develop and implement<br />

the training and training products for which they<br />

are responsible.”<br />

“I highly recommend this program to anyone who<br />

wishes to remain competitive and upwardly mobile<br />

at the <strong>Intelligence</strong> Center. The time and effort<br />

invested in the program pale in comparison with<br />

the dividends enjoyed as a result <strong>of</strong> completing<br />

it,” he adds.<br />

Similar comments come from Mr. Pete Shaver,<br />

Director, MI Foreign Language Training Center, also<br />

a graduate <strong>of</strong> the program. He feels the program<br />

provided him “the capability to design, develop and<br />

evaluate language education programs” and the<br />

“ability to assess their effectiveness.”<br />

Addressing both the personal and pr<strong>of</strong>essional<br />

benefits <strong>of</strong> the program, Mr. Shaver adds, “thanks to<br />

the program, I feel my contribution to the language<br />

community and Fort Huachuca linguists has been<br />

more effective and beneficial.”<br />

Evolving Curriculum<br />

As is the nature <strong>of</strong> educational technology, the<br />

curriculum is constantly evolving to better meet<br />

the technological and educational needs <strong>of</strong> the<br />

<strong>Intelligence</strong> Center and its DA civilians, and remain<br />

relevant. Unlike those first 12 students in the pro-<br />

trAInInG tHE COrPs<br />

gram who received their training in the University’s<br />

traditional classrooms and computer labs, the students<br />

now in the program receive almost all <strong>of</strong> their<br />

training online.<br />

The change to an all online program is reflective<br />

<strong>of</strong> the direction training is taking, and is a major<br />

effort <strong>of</strong> Dr. Betul C. Ozkan, who currently heads<br />

up the Educational Technology Department at the<br />

University <strong>of</strong> Arizona South. Experienced in technology<br />

integration, teacher education, distance learning<br />

environments, educational technology research,<br />

and emerging technologies, she is moving ahead to<br />

make the program relevant to the “millennial” generation<br />

<strong>of</strong> students.<br />

And so, while the core courses in instructional<br />

design and computer applications in education<br />

and training remain, today’s DA civilians in the<br />

program are heavily involved in such courses as<br />

Application <strong>of</strong> Technology in Education; Multimedia<br />

Applications in Education; Introduction to Interface<br />

Design; Designing Online Learning Environments;<br />

Educational Change Through Technology, and<br />

Emerging Technologies in Education. They are engaged<br />

in web based development, authoring tools,<br />

basic programming, scripting, streaming audio and<br />

video, dynamic content determined by server database<br />

values, and many other areas <strong>of</strong> study.<br />

The program is project based with each course requiring<br />

a major development effort by the student.<br />

Students are also expected to complete a comprehensive<br />

best-works portfolio demonstrating competency<br />

within the discipline as a requisite component<br />

for program completion.<br />

Conclusion<br />

The curriculum evolves to meet the ever changing<br />

wave <strong>of</strong> educational technology, but the commitment<br />

remains the same. After 10 years, the <strong>Intelligence</strong><br />

Center is still “growing” their own–investing in the<br />

technological and educational development <strong>of</strong> it’s<br />

civilian training developers and instructors.<br />

Richard K. Ward is an Instructional Systems Specialist in<br />

the Training, Development and Support (TD&S) Directorate,<br />

USAIC, Fort Huachuca, Arizona. He serves as the Chief <strong>of</strong><br />

the Staff & Faculty Development Division (SFDD). Mr. Ward<br />

holds an MA in Education Psychology and Technologies<br />

from the University <strong>of</strong> Arizona. He can be contacted at<br />

rick.ward1@us.army.mil<br />

April - June 2009 57


trAInInG tHE COrPs<br />

Embedded Training: What MI Needs in the Future<br />

Embedded training (ET) is defined as a function<br />

hosted in hardware and/or s<strong>of</strong>tware, integrated into<br />

the overall equipment/system/capability configuration.<br />

With ET the soldier receives information from<br />

the display on the equipment/system and takes action<br />

by making menu selectiond, pushing buttons,<br />

etc. These actions can change the common operating<br />

picture (COP) and the information is transmitted<br />

to other platforms updating the COP in all<br />

the other platforms in a training exercise. As part <strong>of</strong><br />

the normal fielding <strong>of</strong> a new system/equipment New<br />

Equipment Training (NET) is provided to the system<br />

operators and other key personnel.<br />

However NET is usually entry-level training on<br />

“knobology”, the type <strong>of</strong> skills traditionally documented<br />

in user manuals, not “battle-focused” training<br />

that achieves and sustains pr<strong>of</strong>iciency on all<br />

possible Soldier, leader, and collective tasks. The<br />

ET that is required for the future will support commanders<br />

and tactical operations staffs, units, and<br />

soldiers to practice and hone critical warfighting<br />

skills through direct interactions with their warfighting<br />

systems. These systems will incorporate a<br />

full spectrum <strong>of</strong> training support modes as integral<br />

components <strong>of</strong> the system design.<br />

For the <strong>Intelligence</strong> Warfighting Function (IWF)<br />

a system-<strong>of</strong>-systems intelligence training capability<br />

with priority to the operational training domain<br />

(home station, combat training centers, and deployed);<br />

secondarily to the institutional training domain,<br />

and lastly to the self-development training<br />

domain is needed. This ET stimulation training capability<br />

needs to be fielded to the Army to support<br />

tactical <strong>Military</strong> <strong>Intelligence</strong> (MI) units in brigade<br />

combat teams (BCTs) and above. This will enable<br />

realistic battle command training through the high<br />

fidelity simulation, stimulation, and presentation <strong>of</strong><br />

Joint and Army intelligence capabilities. It must be<br />

designed to stimulate the MI collection systems with<br />

scenarios which replicate battlefield situations utilizing<br />

an overarching constructive simulation as the<br />

driver. This will put the MI Soldier in the training<br />

loop using the operational/warfighting equipment<br />

and provide the required reports and data to the<br />

combat commander and his staff.<br />

by Ramona McCaa<br />

This capability, encompassing the latest doctrine<br />

and best practices from the operational force, will<br />

ensure digital training for intelligence systems and<br />

replicate as closely as possible the current and future<br />

<strong>Intelligence</strong> operational environment. The intent<br />

is to concentrate on each applicable individual,<br />

section and/or team’s role and requirement in the<br />

collection, synchronization, integration, production<br />

and dissemination <strong>of</strong> intelligence to support<br />

the commander and drive operations. This capability<br />

relies on actual processors <strong>of</strong> intelligence<br />

to train cross-queuing <strong>of</strong> multi-discipline intelligence<br />

interactions, forcing the production <strong>of</strong> intelligence<br />

products to achieve the needed training for<br />

Commander’s, battle staff and <strong>Intelligence</strong> system<br />

drivers as a cohesive team.<br />

The BCT/Brigade Special Troop Battalion<br />

Commanders, MI company commanders and S2s<br />

will use this ET stimulation/capability to ensure<br />

their organizations and MI soldiers are trained to<br />

support Full Spectrum Operations, and sustain<br />

the low-density MI MOSs training <strong>of</strong> perishable<br />

skills which support the IWF, as an integral part<br />

<strong>of</strong> operations. This sustainment training capability<br />

provides the BCT Commander an accurate evaluation<br />

<strong>of</strong> the IWF capabilities, and accesses the BCT’s<br />

IWF training needs; thereby increasing confidence<br />

in the ability to execute the warfighting mission.<br />

This capability allows the BCT Commander to train<br />

IWF as an essential element <strong>of</strong> Battle Command As<br />

a Weapon System on intelligence collection through<br />

production, integration, and reporting using the very<br />

systems the Soldiers employ. This allows the IWF to<br />

train as it would operate and to develop effective<br />

<strong>Intelligence</strong> Soldiers as appropriate combat multipliers.<br />

This training capability is not exclusive to the<br />

BCT; it also supports training and evaluation <strong>of</strong> the<br />

Battlefield Surveillance Brigade and IEW/ISR system<br />

training at all echelons in a similar manner.<br />

Ramona McCaa served as a Lieutenant Colonel in the U.S.<br />

Army with primary experience in the U.S. Army Acquisition<br />

Corps. She is currently a contractor with the New Systems<br />

and Training Integration Office at Fort Huachuca, Arizona<br />

where she serves as the Deputy Operations Group Chief. She<br />

may be contacted at (520) 533-2590.<br />

58 <strong>Military</strong> <strong>Intelligence</strong>


March 29, 2009, White Sands Missile Range, New Mexico.<br />

Photos by Sergeant Austin Thomas<br />

More than 5,300 participants from 50 states and eight countries,<br />

including the Philippines, Germany, Canada and the<br />

United Kingdom came together for the 20th Annual Bataan<br />

Memorial Death March.<br />

Paul Kerchum <strong>of</strong> Benson, Arizona, a Bataan survivor, who<br />

served with B Co, 31 st Infantry Battalion, had this to say,<br />

“10,000 men died on that hot, dusty road. They were shot,<br />

bayoneted, beheaded, or beaten to death for no reason<br />

whatsoever, . . . I think <strong>of</strong> that limerick composed by an<br />

anonymous member <strong>of</strong> the 31 st Infantry on Bataan:<br />

We are the battling bastards <strong>of</strong> Bataan,<br />

No mama, no poppa, no Uncle Sam.<br />

No aunts, no uncles, no nephews or nieces,<br />

No guns, no ammunition, no artillery pieces,<br />

And nobody gives a damn!”<br />

Team Hell Hounds, HHC, USAIC, Fort Huachuca, Arizona<br />

from left to right: SPC Zachary Taylor, SSG Charles Dybo,<br />

SFC David Schreiner, SGT Austin Thomas, and SSG RJ<br />

Niesen.<br />

Everyone who participated had their individual reasons for<br />

being there, but all came to honor the Soldiers, Marines,<br />

Airmen, and Sailors who sacrificed their lives. <strong>Military</strong> and<br />

civilian, young and old marched, ran and rucked side by side<br />

across the rough terrain.<br />

April - June 2009 59


Buffalo<br />

Soldier dedication<br />

Story and photo by Garlan Martens<br />

(From left) Joan Way, president <strong>of</strong> the Southwest Association <strong>of</strong> Buffalo<br />

This article originally appeared in the Fort Soldiers, the Honorable Ronald James, assistant secretary <strong>of</strong> the Army<br />

Huachuca Scout, 30 April 2009, and is reprinted (Manpower and Reserve Affairs) and MG John Custer unveil the plaque at the<br />

with permission.<br />

dedication ceremony <strong>of</strong> the Buffalo Soldier Legacy Plaza, Friday.<br />

For more than 50 years, black men from around the United States called Fort Huachuca home and became<br />

known as Buffalo Soldiers. On April 23, their contributions to the Army and the Southwest were recognized<br />

at the dedication ceremony <strong>of</strong> the Buffalo Soldier Legacy Plaza.<br />

The plaza, located across from the traffic circle in what is known as Old Post, is also the new location<br />

for the Buffalo Soldier statue that stood by the main gate for many years. The statue, first dedicated over<br />

30 years ago to mark Fort Huachuca’s 100th anniversary, was moved when Major General Barbara Fast,<br />

a former post commander, formalized the idea for the plaza and Legacy Trail. The walking trail begins at<br />

the plaza and takes visitors through Old Post stopping at many historical sites such as the Fort Huachuca<br />

Museum.<br />

The legacy <strong>of</strong> the Buffalo Soldier is one dating back to 1866 when Congress passed legislation approving<br />

the formation <strong>of</strong> six Army regiments which included the 9th and 10th Cavalry. The 24th and 25th Infantry<br />

were formed separately several years later, and conducted missions around the West. Beginning in 1892,<br />

all four <strong>of</strong> the units were permanently located at the remote Army post in Southeast Arizona and remained<br />

there for years to come. Major General John Custer reminded all in attendance that, although many other<br />

Army installations claim they are the home <strong>of</strong> the Buffalo Soldiers, Fort Huachuca is the true home <strong>of</strong> the<br />

black soldiers.<br />

“We should all hold that very dear,” he added. The guest speaker for the dedication was the Honorable<br />

Ronald James, the assistant secretary <strong>of</strong> the Army (Manpower and Reserve Affairs). James, also a retired<br />

Army Officer, spoke <strong>of</strong> the long history black Soldiers have made in the military, not only the Buffalo<br />

Soldiers, but others dating back to the Civil War. His remarks centered on people such as his great grandfather,<br />

Alexander Hogan, who was born into slavery and entered the military later in life. He added that<br />

many such as his great grandfather made the ultimate sacrifice for a divided nation not fully appreciative<br />

<strong>of</strong> their service and dedication. James also spoke about how the plaza would be a lasting tribute to all<br />

black Soldiers and the steps they made to make a difference in the Armed services.<br />

The dedication concluded with James, Custer, Colonel Melissa Sturgeon (Fort Huachuca garrison commander),<br />

Joan Way, representing the Southwest Buffalo Soldier Association ,and Ron Eppich <strong>of</strong> the Old<br />

Guard Riders, unveiling the plaque in front <strong>of</strong> the Buffalo Soldier statue and then raising the red and white<br />

Buffalo Soldier Cavalry Guidon.<br />

60 <strong>Military</strong> <strong>Intelligence</strong>


The 22 nd Annual <strong>Military</strong> <strong>Intelligence</strong> (MI) Corps Hall <strong>of</strong> Fame Induction Ceremony was held at Fort<br />

Huachuca on 26 June 2008. Including this year’s seven inductees, only 217 MI pr<strong>of</strong>essionals have been<br />

selected for membership into the Hall <strong>of</strong> Fame. The selection process is deliberate and thorough. Each<br />

nomination is judged by a board <strong>of</strong> active and retired senior <strong>of</strong>ficers, noncommissioned <strong>of</strong>ficers, and pr<strong>of</strong>essional<br />

MI civilians.<br />

The 2009 inductees are: Major General Robert A. Harding (U.S. Army, Retired); Major General William<br />

E. Harmon (U.S. Army, Retired); Brigadier General Roy M. Strom (U.S. Army, Retired); Chief Warrant<br />

Officer Five Wallace S. Price (U.S. Army, Retired); Chief Warrant Officer Three Doris I. Allen (U.S. Army,<br />

Retired); Command Sergeant Major Odell Williams (U.S. Army, Retired, Deceased); and Command<br />

Sergeant Major Ronald D. Wright (U.S. Army, Retired)<br />

Major General Robert A. Harding, (U.S. Army, Retired)<br />

Major General Robert A. Harding is a native <strong>of</strong> New York City (NYC). He was commissioned as<br />

a second lieutenant from the Officer Candidate School, Fort Belvoir, Virginia, in April 1969. From<br />

September 1969 to April 1971, then Second Lieutenant Harding conducted Counterintelligence (CI) investigations<br />

and operations with the 108 th MI Group in NYC. He left New York to command the Inchon<br />

and Uijongbu Field Offices in Korea. He concluded<br />

his initial assignment for the 501 st MI Group in<br />

May 1972. Captain Harding then assumed command<br />

<strong>of</strong> Headquarters Company, 1 st MI Battalion<br />

at Fort Bragg, North Carolina.<br />

In early 1975, CPT Harding was assigned to the<br />

Defense <strong>Intelligence</strong> Agency (DIA) in the Pentagon<br />

as the strategic analyst for Korea, where he served<br />

until October 1978. Following this assignment,<br />

he served first as the S2 <strong>of</strong> the 1 st Battalion, 59 th<br />

Air Defense Artillery, 8 th Mechanized Infantry<br />

Division, and then as the S2 for the 1 st Brigade, 8 th<br />

Mechanized Infantry Division. While serving as the<br />

Brigade <strong>Intelligence</strong> Officer, CPT Harding was promoted<br />

to the rank <strong>of</strong> Major. Returning stateside,<br />

he was assigned as the <strong>Pr<strong>of</strong>essional</strong> Development<br />

Officer, U.S. Army <strong>Military</strong> Personnel Center,<br />

Alexandria, Virginia. Approximately two years later,<br />

he would report as a student to the Armed Forces<br />

Staff College in Norfolk, Virginia. Upon his graduation<br />

in June 1983, MAJ Harding assumed the duties<br />

as the Executive Officer, Army CI Directorate<br />

in the Pentagon. In October 1985, he moved to the<br />

April - June 2009 61


position <strong>of</strong> Assistant to the Director <strong>of</strong> the Army Staff, where he served for almost three years, and during<br />

which he was promoted to Lieutenant Colonel.<br />

LTC Harding then assumed command <strong>of</strong> the 524 th MI Battalion, Eighth U.S. Army, Korea. Returning<br />

from Korea in July 1990, he attended the U.S. Naval War College in Newport, Rhode Island. From July<br />

1991 to June 1992, he served as the Assistant Deputy Chief <strong>of</strong> Staff for Operations and Plans, U.S. Army<br />

<strong>Intelligence</strong> and Security Command (INSCOM), Fort Belvoir, Virginia, and was promoted to the rank <strong>of</strong><br />

Colonel. Following his promotion, COL Harding commanded <strong>of</strong> the 902 nd MI Group (CI) at Fort Meade,<br />

Maryland, for two years. After leaving this post, he was assigned to the Pentagon as the Executive Officer<br />

to the Deputy Chief <strong>of</strong> Staff for <strong>Intelligence</strong>, U.S. Army.<br />

In September 1995, he reported to Quarry Heights, Panama, to serve as the Director <strong>of</strong> <strong>Intelligence</strong> (J2)<br />

for the U.S. Southern Command, where he was responsible for directing and managing daily collection and<br />

reporting activities. He planned and executed intelligence support to military operations, including contingency<br />

planning and crisis actions. During his tenure as the J2, COL Harding was promoted to the rank<br />

<strong>of</strong> Brigadier General in July 1996. Upon completing his duties in Panama, BG Harding returned to DIA to<br />

serve as the Director <strong>of</strong> Operations from December 1996 to March 2000. While serving as the Director <strong>of</strong><br />

Operations, he was promoted to Major General in October 1999. MG Harding’s final assignment in uniform<br />

was as Deputy G2, U.S. Army, in Washington, D.C. He concluded his distinguished Army intelligence<br />

career <strong>of</strong> 33 years when he retired in August 2001.<br />

Major General Harding’s awards and decorations include the Defense Distinguished Service Medal, the<br />

Army Distinguished Service Medal, the Defense Superior Service Medal, the Legion <strong>of</strong> Merit (3 OLCs), the<br />

Defense Meritorious Service Medal, the Army Meritorious Service Medal (2 OLCs), and the Army Staff<br />

Identification Badge.<br />

Major General William E. Harmon, (U.S. Army, Retired)<br />

Major General William E. Harmon was commissioned as a second lieutenant in the Infantry in the summer<br />

<strong>of</strong> 1960 and reported for the Infantry Officer Basic Course at Fort Benning, Georgia in August 1960.<br />

His first assignment was as an Infantry Platoon Leader with D Company, 2 nd Airborne Battle Group, 187 th<br />

Infantry at Fort Campbell, Kentucky where he served nearly two years as a Platoon Leader and Company<br />

Executive Officer. In 1962 Lieutenant Harmon was<br />

detailed from Infantry to Army <strong>Intelligence</strong>, before<br />

MI became an active duty branch. He received training<br />

at the <strong>Intelligence</strong> Research Officer Course, U.S.<br />

Army <strong>Intelligence</strong> School at Fort Holabird, Maryland.<br />

While there, he transferred to the newly formed active<br />

duty Army <strong>Intelligence</strong> and Security Branch,<br />

and remained in MI until his retirement thirty two<br />

later.<br />

His first MI field assignment was in 1963 as a<br />

CI Officer, 201 st MI Detachment, I Corps Group<br />

Headquarters, Uijongbu, Korea. In February 1964,<br />

he served as the G2 Security and Automation<br />

Officer, while assigned to the 11 th MI Detachment,<br />

11 th Air Assault Division at Fort Benning, during the<br />

Army field testing <strong>of</strong> the air assault concept. Moving<br />

to Fort Bragg in December 1964, CPT Harmon assumed<br />

the duties as Chief, Current <strong>Intelligence</strong><br />

Branch, G2, U.S. Army Kennedy Center for Special<br />

Warfare. In September 1965, he reported as a Plans<br />

Officer, S3, 519 th MI Battalion to help plan and ex-<br />

62 <strong>Military</strong> <strong>Intelligence</strong>


ecute the movement <strong>of</strong> the 525 th MI Group to Vietnam. Once in Vietnam he was attached to the 5 th Special<br />

Forces Group (VN) as the CI Officer for Detachment C-5 (Project Horse). CPT Harmon then returned to Fort<br />

Holabird to attend the MI Officer Advanced Course. Following the course he was assigned to the Office <strong>of</strong><br />

the G2, U.S. Army Pacific, Fort Shafter, Hawaii with duty on the Korea Desk for a brief period; then was<br />

reassigned to the Vietnam Desk following the Tet Offensive.<br />

Major Harmon would return to Vietnam and serve on the III Corps Desk, J2, U.S. <strong>Military</strong> Assistance<br />

Command Vietnam (MACV). In August 1969 he attended the U.S. Army Command and General Staff<br />

College before reporting to London, England to become a Desk Officer studying the Soviet Army on the<br />

British <strong>Intelligence</strong> Staff. After three years in England, MAJ Harmon assumed command <strong>of</strong> the 203 rd<br />

MI Detachment, III Corps at Fort Hood, Texas. Following command, in March 1976 he became the G2,<br />

2 nd Armored Division. In May <strong>of</strong> 1977, Lieutenant Colonel Harmon assumed command <strong>of</strong> the 522 nd MI<br />

Battalion (CEWI), 2 nd Armored Division at Fort Hood. Following battalion command, he attended the U.S.<br />

Army War College, Carlisle Barracks, Pennsylvania.<br />

Upon graduating from the War College, Colonel Harmon assumed the duties as the Director, Signals<br />

<strong>Intelligence</strong> (SIGINT) Division, <strong>Intelligence</strong> Systems Directorate, Office <strong>of</strong> the Assistant Chief <strong>of</strong> Staff for<br />

<strong>Intelligence</strong>, U.S. Army. For one year he would serve in the Pentagon before returning in July 1980 to Fort<br />

Bragg to become the XVIII Airborne Corps Deputy G2. In January 1981, COL Harmon assumed command<br />

<strong>of</strong> the 525 th MI Group (CEWI), XVIII Airborne Corps. He would command the Group for two and half years.<br />

In June <strong>of</strong> 1983, he became the Director, <strong>Intelligence</strong> Systems Directorate, Office <strong>of</strong> the Assistant Chief <strong>of</strong><br />

Staff for <strong>Intelligence</strong>, U.S. Army.<br />

In November <strong>of</strong> 1984 until 1990, Brigadier General Harmon was the Program Manager, Joint Tactical<br />

Fusion Program Management Office, Office <strong>of</strong> the Deputy Chief <strong>of</strong> Staff for Operations and Plans, U.S.<br />

Army, Washington, D.C. His final assignment was as the Program Executive Officer for Command and<br />

Control Systems, Fort Monmouth, New Jersey. He retired in 1992 after a distinguished career spanning<br />

32 years.<br />

Major General Harmon’s awards and badges include<br />

the Distinguished Service Medal, Legion <strong>of</strong><br />

Merit, Bronze Star Medal (2 OLCs), Meritorious<br />

Service Medal (1 OLC), Joint Service Commendation<br />

Medal, Army Commendation Medal, Master<br />

Parachutist Badge, Ranger Tab and the Army Staff<br />

Identification Medal.<br />

Brigadier General Roy M. Strom, (U.S.<br />

Army, Retired)<br />

Brigadier General Roy M. Strom was commissioned<br />

as a second lieutenant in Artillery in 1954<br />

and reported to Artillery Officer Basic Course at Fort<br />

Bliss, Texas. His first assignment would be as a second<br />

lieutenant serving as a Platoon Leader, 764 th<br />

Anti-Aircraft Artillery, 90/120 mm Gun Battalion at<br />

Fort Clayton, Panama, Canal Zone. He also commanded<br />

the Caribbean Command Honor Guard<br />

Company to honor dignitaries during their visits<br />

to the Canal Zone. Returning to the U.S., he attended<br />

Gunnery School, Fort Sill, Oklahoma, then<br />

the Airborne School at Fort Benning. In November<br />

<strong>of</strong> 1959, Captain Strom reported to Columbus, Ohio<br />

where he would assume the duties as an <strong>Intelligence</strong><br />

April - June 2009 63


Officer, Columbus Field Office, 109 th CI Corps Group. Serving for approximately two and one half years,<br />

he departed Ohio in January 1962 and transferred to Korea where he served as the Officer-in-Charge <strong>of</strong><br />

the Inchon Field Office, 502d MI Battalion from May 1963 to May 1964. His next assignment was at Fort<br />

Holabird where CPT Strom would serve the next 19 months as the Aide-de-Camp to the Commanding<br />

General, <strong>Intelligence</strong> School, Fort Holabird.<br />

In July 1967, Major Strom was assigned as the <strong>Intelligence</strong> Officer to the Army’s Alternate Command<br />

Post, Operations Group, Army War College at Carlisle Barracks. After two years in Pennsylvania, MAJ<br />

Strom took command <strong>of</strong> the 519 th MI Battalion, 525 th MI Group serving in combat operations in Vietnam.<br />

In January 1970, he took command <strong>of</strong> the 4 th MI Battalion, 525 th MI Group also conducting operations in<br />

the Delta region <strong>of</strong> Vietnam. After concluding his second command, Lieutenant Colonel Strom reported to<br />

Munich, Germany, where he took command <strong>of</strong> his third battalion, the 18 th MI Battalion, 66 th MI Group.<br />

He left command in March 1972 and complete 16 months as the Adjutant <strong>of</strong> the 66 th MI Group in Munich<br />

before returning to Washington, D.C. where he would become a CI Officer and Executive Officer in the<br />

Office <strong>of</strong> the Assistant Chief <strong>of</strong> Staff for <strong>Intelligence</strong>, Department <strong>of</strong> the Army. LTC Strom served a little<br />

over two years in the Pentagon and then became the Deputy Commander, U.S. Army Special Security<br />

Group in Washington. Moving over to DIA approximately one year later, he became the Staff Chief, Special<br />

<strong>Intelligence</strong> Operations from June 1977 to June 1978.<br />

In July <strong>of</strong> that year, Colonel Strom took command <strong>of</strong> the 500 th MI Brigade, INSCOM at Camp Zama,<br />

Japan. Two years later, in July 1980, he assumed the duties as the Deputy Commandant and served as<br />

the Commandant <strong>of</strong> the U.S. Army <strong>Intelligence</strong> Center (USAIC), Fort Huachuca, Arizona. Early in 1982,<br />

BG Strom returned to Washington, D.C. to become the Deputy Assistant Chief <strong>of</strong> Staff for <strong>Intelligence</strong>,<br />

Department <strong>of</strong> the Army.<br />

His final assignment was as the Deputy Chief <strong>of</strong> Staff for <strong>Intelligence</strong>, U.S. Forces Command (FORSCOM),<br />

Fort McPherson, Georgia. It was during this tour that he and his staff developed a workable language<br />

maintenance program fitting the reserve components, as well as active forces, to keep pace with the requirements<br />

<strong>of</strong> an army facing the need for language<br />

facility. In March 1985, he retired from active duty<br />

in the U.S. Army after having served honorably for<br />

31 years.<br />

Brigadier Strom’s awards and badges include<br />

the Distinguished Service Medal, Legion <strong>of</strong> Merit,<br />

Bronze Star, Meritorious Service Medal (3 OLCs),<br />

National Defense Medal (1 OLC), Vietnamese Service<br />

Medal, Department <strong>of</strong> Army Staff Badge, U.S. and<br />

Vietnamese Parachutist Wings.<br />

Chief Warrant Officer Five Wallace S.<br />

Price, (U.S. Army, Retired)<br />

A native <strong>of</strong> Oregon, Chief Warrant Officer Wally<br />

Price began his Army career in 1966 with the<br />

Army Security Agency (ASA). He attended Defense<br />

Language Institute (DLI) for Czech language training,<br />

and following advanced training at Goodfellow,<br />

AFB, Texas was assigned to Detachment J, 16 th<br />

ASA Field Station, Schneeberg, Federal Republic <strong>of</strong><br />

Germany. From 1967 until 1970, he provided intelligence<br />

support for U.S. Army Europe and NATO<br />

commands during the Warsaw Pact invasion <strong>of</strong><br />

Czechoslovakia.<br />

64 <strong>Military</strong> <strong>Intelligence</strong>


Upon completion <strong>of</strong> his tour <strong>of</strong> duty in 1970,<br />

he returned to civilian life to attend school, graduating<br />

in 1974 from the University <strong>of</strong> Texas at<br />

Austin with a BA in Slavic languages. In 1975 he<br />

returned to active duty in the ASA. His initial assignment<br />

was as a Technical Language Advisor at<br />

DLI, where he worked with native instructors to<br />

provide unclassified training in military occupational<br />

specialty (MOS) related military and technical<br />

terminology. In 1976 he was appointed as a<br />

Warrant Officer and returned to Germany, where<br />

he served as a watch supervisor overseeing operations<br />

at the U.S. Army Field Station Augsburg.<br />

While there, he achieved certification by the<br />

National Security Agency (NSA) as a Language<br />

Analyst and Voice Language Analyst. He became<br />

pr<strong>of</strong>icient in three languages–Czech, Russian and<br />

German, and maintained his pr<strong>of</strong>iciency for the<br />

remainder <strong>of</strong> his military career.<br />

CWO Price returned to the DLI Foreign Language<br />

Center in December 1980 for advanced language<br />

training in Czech, graduating with honors. He remained<br />

for a year as a Training Officer in the Slavic<br />

Language Group until September 1981. Heading to<br />

Fort Devens, Massachusetts from DLI, CWO Price<br />

became the Chief Instructor and Officer in Charge <strong>of</strong><br />

the MOS 98G (Voice Intercept Operator) Task Force.<br />

He returned to Germany for a third tour in 1983,<br />

serving in several different positions at Field Station<br />

Augsburg. While there, he served on the task force<br />

responsible for transitioning <strong>of</strong> the field stations<br />

into the 701 st MI Brigade. He would serve at Field<br />

Station Augsburg until March 1986.<br />

Fort Meade became CWO Price’s home again<br />

from April 1986 until December 1991. While there<br />

he first was assigned to Operations Group A at<br />

NSA, where he served in sensitive technical and<br />

leadership positions. Although his title would<br />

be Senior Technician and Deputy Branch Chief,<br />

NSA, he would serve in a variety <strong>of</strong> roles. During<br />

Operations Desert Shield and Storm, he volunteered<br />

to augment the Cryptologic Support Group<br />

at U.S. Central Command (CENTCOM) Forward<br />

Headquarters in Riyadh, Saudi Arabia, where he<br />

served as a team leader directing CSG operations<br />

on watch. In 1992, he became the Deputy Chief,<br />

Exploitation and Production, Bravo Company,<br />

743 rd MI Battalion, Menwith Hill Station, United<br />

Kingdom. While serving in England, CW5 Price<br />

helped lead the Support <strong>Military</strong> Operations efforts<br />

for Operations Provide Comfort, Northern<br />

and Southern Watch in Southwest Asia and for<br />

NATO operations in the Balkans.<br />

Chief Warrant Officer Five Price returned to Fort<br />

Meade in November 1993, as the Team Chief and<br />

the NSA representative to the National <strong>Military</strong><br />

Command Center, where he assisted in establishing<br />

the Cryptologic Support Team, and ultimately the<br />

Cryptologic Support Group at the National <strong>Military</strong><br />

Joint <strong>Intelligence</strong> Center. Nearly two years later in<br />

the spring <strong>of</strong> 1995, CW5 Price was transferred to<br />

the 344 th MI Battalion, Goodfellow AFB, where he<br />

served as the Officer-in-Charge <strong>of</strong> the MOS 98G<br />

training where he oversaw the design, planning and<br />

execution <strong>of</strong> all Army SIGINT/Electronic Warfare<br />

(EW) linguist training.<br />

In 1997 he was assigned as Senior Technical<br />

Advisor in the Army Technical Control and<br />

Analysis Element to the 704th MI Brigade. While<br />

there, and following the 9/11 attacks and onset<br />

<strong>of</strong> Operation Enduring Freedom (OEF), CW5<br />

Price initiated an international collaborative effort<br />

with Commonwealth Allies, helping to create<br />

the first U.S./Canadian SIGINT-EW Operations<br />

Coordination Center in Afghanistan using the<br />

NATO model. Later he worked on the creation <strong>of</strong> the<br />

first NSA Cryptologic Support Teams deployed to<br />

Operation Iraqi Freedom (OIF). In July <strong>of</strong> 2003, he<br />

served as the Special Assistant for <strong>Military</strong> Affairs<br />

to the SIGINT Director, NSA. CW5 Price retired<br />

from the Army after 35 years <strong>of</strong> distinguished service.<br />

After retirement, he began work at INSCOM<br />

in the Army Cryptologic Operations <strong>of</strong>fice at Fort<br />

Meade. He became a driving force in developing<br />

the concept for SIGINT Foundry support. He continues<br />

today serving as a DA civilian assigned in<br />

support <strong>of</strong> INSCOM as an <strong>Intelligence</strong> Staff Officer<br />

in the Army Cryptologic Office. Currently, he is<br />

engaged in planning and coordinating pre-deployment<br />

orientation visits to NSA for division, brigade<br />

and battalion commanders preparing for<br />

OIF and OEF rotations as part <strong>of</strong> a FORSCOM G2<br />

program.<br />

Chief Warrant Officer Five Price’s awards and<br />

decorations include the Defense Superior Service<br />

Medal (1 OLC), the Legion <strong>of</strong> Merit, the Bronze<br />

Star Medal, the Defense Meritorious Medal, the<br />

Meritorious Service Medal (1 OLC), the Joint Services<br />

April - June 2009 65


Commendation Medal, the Army Commendation Medal (1 OLC), the Army Achievement Medal, and the<br />

Joint Chiefs <strong>of</strong> Staff Identification Badge.<br />

Chief Warrant Officer Three Doris I. Allen, (U.S. Army, Retired)<br />

Chief Warrant Officer Three Doris I. “Lucki” Allen,<br />

a native <strong>of</strong> El Paso, Texas, enlisted into the Women’s<br />

Army Corp through Jackson, Mississippi in late<br />

1950. She completed basic, then advanced training,<br />

as an Entertainment Specialist at the Adjutant<br />

General School in 1951 at Fort Lee, Virginia. She<br />

spent a few months at the Presidio <strong>of</strong> San Francisco,<br />

California and Fort Lewis, Washington before going<br />

overseas. Private First Class Allen served for a year<br />

and half as an Entertainment Specialist organizing<br />

Soldier shows and as the Editor <strong>of</strong> the <strong>Military</strong><br />

Newspaper for the Army Occupation Forces in support<br />

<strong>of</strong> the Korean War in Camp Sendai, Japan.<br />

Upon returning Corporal Allen was assigned as<br />

a radio broadcast specialist at Camp Stoneman in<br />

California. After the closing <strong>of</strong> Camp Stoneman,<br />

Specialist Five Allen was assigned to Oakland Army<br />

Base, California and then attended the Armed<br />

Forces Information School at Fort Slocum, New<br />

York for the Information Specialist course. In 1956,<br />

SP5 Allen returned to Japan and served as a Public<br />

Information Officer and Newspaper Editor. After<br />

two years in Japan, she returned to the U.S. and<br />

served as an Information Specialist. From 1958, she served for five years as an Information Specialist<br />

for the Headquarters at Fort Monmouth. After completing French language training at DLI in 1963, SP5<br />

Allen became the first military female trained in a Prisoner <strong>of</strong> War Interrogation course at the U.S. Army<br />

<strong>Intelligence</strong> School, Fort Holabird.<br />

Upon the completion, she was assigned as an interrogator to Headquarters, U.S. Continental Army<br />

Command <strong>Intelligence</strong> Center, Fort Bragg. For the next two years she would serve as the sole strategic<br />

intelligence analyst covering Latin America affairs until 1965. While at Fort Bragg, and as one <strong>of</strong> only 22<br />

persons in the entire Armed Forces to hold that rank, Specialist Seven Allen completed interrogation and<br />

intelligence analyst courses where she was the honor graduate in three consecutive courses conducted by<br />

the Third U.S. Army Area <strong>Intelligence</strong> School in 1967.<br />

SP7 Allen would then report to Vietnam and serve as the Senior <strong>Intelligence</strong> Analyst, Army Operations<br />

Center, Headquarters, U.S. Army (USARV) at Long Binh, Vietnam. While in Vietnam she started her second<br />

tour and held the position <strong>of</strong> Supervisor, Security Division, Office <strong>of</strong> the Assistant Chief <strong>of</strong> Staff,<br />

Security, Plans, and Operations, Headquarters, 1 st Logistical Command, Vietnam. In the Spring <strong>of</strong> 1970<br />

she would be appointed as a Warrant Officer. She was then one <strong>of</strong> only nine female warrant <strong>of</strong>ficers in MI<br />

and one <strong>of</strong> only 23 in the entire Army at the time.<br />

WO Allen began her third consecutive tour in Vietnam in March 1970 as the Officer in Charge <strong>of</strong> the<br />

Translation Branch, Combined Document Exploitation Center–MACV, Saigon, Vietnam. Despite not<br />

being able to speak Vietnamese, WO Allen supervised approximately 40 South Vietnamese nationals<br />

employed in the translation <strong>of</strong> the large amount <strong>of</strong> captured enemy documents brought to the center<br />

on a daily basis. Her loyalty, diligence, and devotion in all <strong>of</strong> her assignments in Vietnam earned her<br />

the Bronze Star with 2 Oak Leaf clusters.<br />

66 <strong>Military</strong> <strong>Intelligence</strong>


Returning to the U.S. from Vietnam in September 1970, she would serve as an Instructor for Prisoner <strong>of</strong><br />

War Interrogations, Army <strong>Intelligence</strong> Center and School, Fort Holabird and moved with the school in 1971<br />

to Fort Huachuca. After completing the CI Transition Course in 1971, WO Allen returned to DLI where she<br />

completed the German course.<br />

After a stint with the intelligence unit at the Presidio <strong>of</strong> San Francisco, Chief Warrant Officer Two Allen<br />

was sent overseas. Her follow on assignment was as a Special Agent with the 527th MI Brigade, Federal<br />

Republic <strong>of</strong> Germany. In 1977, CW2 Allen reported to the INSCOM’s CI and Signal Security Battalion,<br />

Presidio <strong>of</strong> San Francisco, where she worked as the Senior CI Agent and Security Manager. While at the<br />

Presidio, CW2 Allen would be promoted to Chief Warrant Officer Three in 1978. CW3 Allen retired after a<br />

distinguished 30 year career in 1980.<br />

Chief Warrant Officer Three Allen’s awards and decorations include the Bronze Star (2 OLCs), Meritorious<br />

Service Medal, Army Commendation Medal, Good Conduct Medal (6th award), Army <strong>of</strong> the Occupation<br />

Medal (Japan), National Defense Service Medal (1 OLC), Vietnam Service Medal (10 Campaigns), United<br />

Nations Service Medal, the Republic <strong>of</strong> Vietnam Campaign Medal, the Korean Service Medal, Presidential<br />

Unit Citation, Meritorious Unit Commendation, and the Vietnam Cross <strong>of</strong> Gallantry with Palm.<br />

Command Sergeant Major Odell Williams, (U.S. Army, Retired, Deceased)<br />

Command Sergeant Major Odell Williams entered<br />

the U.S. military on July 26, 1955 and was<br />

first trained as an Aircraft Mechanic, and then<br />

later trained and served as a Firefighter in the<br />

U.S. Navy Reserves until May 1960. In September<br />

1960, he entered the U.S. Army and attended the<br />

Manual Morse Collector’s Course at Fort Devens,<br />

graduating in April 1961. That same month, then<br />

Specialist Four Williams would report to his first assignment<br />

as a Morse Interceptor at Vint Hill Farms<br />

Station, Virginia where he served until October<br />

1961. In November 1961 he reported to the 5 th<br />

Radio Research Unit, Bangkok, Thailand serving as<br />

a Morse Interceptor for a year and a half. Specialist<br />

Five Williams returned to the U.S. in April 1963<br />

where he would complete two more assignments as<br />

a Morse Interceptor. The first assignment was to the<br />

303rd ASA Battalion at Fort Carson, Colorado from<br />

May 1963 to May 1964, and then at Fort Lewis from<br />

June 1964 to June 1965.<br />

In summer <strong>of</strong> 1965, Staff Sergeant Williams served<br />

as Senior Morse Interceptor with Detachment 2, 3rd Radio Research Unit, U.S. Army Pacific and the 11th Radio Research Unit during combat operations in the Republic <strong>of</strong> Vietnam. The following year, September<br />

1966, he became Senior Morse Instructor at the Headquarters and Headquarters Company, ASA Training<br />

Center, Fort Devens, where he served in the position for three years.<br />

In the fall <strong>of</strong> 1969 Sergeant First Class Williams would transition from duties as instructor to those<br />

<strong>of</strong> leader and supervisor. In September, he reported for duty with A Company, ASA Field Station, Sobe,<br />

Okinawa, where he supervised all Morse Intercept operations. Because <strong>of</strong> his outstanding performance<br />

as supervisor, he was selected to become the A Company First Sergeant in April 1971, a position he held<br />

with distinction for nearly two years until he was reassigned in 1973. His reassignment brought SFC<br />

Williams back to the U.S. for additional training; first at the Cryptology Supervisor Course from April to<br />

May 1973, and then to Senior NCO training with C Company, ASA Support Battalion (SB), Fort Devens,<br />

April - June 2009 67


from May to July 1973. Following his training, SFC Williams would serve as a Senior Instructor with the<br />

Operations Company, SB, Fort Devens until May 1974. That same month he reported to 2 nd Battalion,<br />

ASA SB, Fort Devens and for a second time would serve as the First Sergeant <strong>of</strong> a company (F Company,<br />

2 nd Battalion).<br />

Two years later, from April 1976 to March 1977, he was assigned to Headquarters and Headquarters<br />

Company, ASA Field Station Korea where he served as Mission Management Supervisor and Operations<br />

Sergeant. In 1977, Master Sergeant Williams served as First Sergeant for the Operations Company, ASA<br />

Field Station Korea. In June 1977, MSG Williams returned to the U.S. where he would serve as First<br />

Sergeant for the fourth time with F Company, 2 nd Battalion, U.S. Army <strong>Intelligence</strong> School, Fort Devens.<br />

Having served for two years MSG Williams was selected attended the Army Sergeant Major’s Academy at<br />

Fort Bliss. In February 1980, he transferred to Germany to serve as the Operations Sergeant for Field<br />

Station Berlin. In June 1981, Command Sergeant Major Williams served as the S3 Sergeant Major, Field<br />

Station Berlin. CSM Williams was then assigned to Kunia, Wheeler Air Force Base, Hawaii in July 1982<br />

where he served for three years as the Command Sergeant Major for the Army component. His leadership<br />

and vision ensured that the field station at Kunia would become the premier listening post in the Pacific.<br />

Late in 1985, he became the Senior Enlisted Advisor to the National Security Agency/Central Security<br />

Service (NSA/CSS), U.S. Army Element NSA at Fort Meade. He served as the Command Sergeant Major<br />

for NSA/CSS for three years.<br />

CSM Williams was the first ever Command Senior Enlisted Advisor to the Director to the NSA where<br />

he led in a multi-service environment. His leadership and intelligence support contributed to the successful<br />

diplomacy and the executions <strong>of</strong> operations in incidences such as the TWA hijacking in Lebanon<br />

in June 1985, the rescue <strong>of</strong> the Achille Lauro in October 1985, and the bombing raid in Libya in April<br />

1986. CSM Williams retired in 1988 after honorably serving 33 years with a distinguished career in Army<br />

<strong>Intelligence</strong>.<br />

Command Sergeant Major Williams’ awards and badges include the Distinguished Service Medal, Legion<br />

<strong>of</strong> Merit, Bronze Star, Meritorious Service Medal (6 OLCs), National Defense Medal (1 OLC), Vietnamese<br />

Service Medal, Department <strong>of</strong> Army Staff Badge, U.S. Parachutist Wings, and the Vietnamese Parachutist<br />

Wings. In 2001 he was awarded the National <strong>Military</strong> <strong>Intelligence</strong> Association’s Major General John E.<br />

Morrison Award for outstanding pr<strong>of</strong>essionals.<br />

Command Sergeant Major Ronald D.<br />

Wright, (U.S. Army, Retired)<br />

Command Sergeant Major Ronald D. Wright is a<br />

native <strong>of</strong> Fort Smith, Arkansas. He enlisted in the<br />

U.S. Air Force and served from 1971 to 1975 as a<br />

parachute rigger. In 1979, after a four year break<br />

in military service, he entered the U.S. Army as an<br />

<strong>Intelligence</strong> Analyst. Specialist Wright served as the<br />

Senior <strong>Intelligence</strong> Analyst and as the Assistant<br />

NCOIC <strong>of</strong> the Battle Information Coordination<br />

Center, 3 rd Brigade, 101 st Airborne Division, Fort<br />

Campbell. During his assignment at Fort Campbell,<br />

SPC Wright was promoted to Sergeant. He would then<br />

be assigned to the Headquarters and Headquarters<br />

Company, 2 nd Armored Division (Forward) in the<br />

Federal Republic <strong>of</strong> Germany. While in Germany,<br />

he exhibited initiative, resourcefulness, and pr<strong>of</strong>essional<br />

competence. Because <strong>of</strong> these qualities, he<br />

was selected by his leadership to compete for NCO<br />

68 <strong>Military</strong> <strong>Intelligence</strong>


<strong>of</strong> the Year for U.S. Army, Europe. In 1983, Sergeant<br />

Wright’s exemplary past performance and future<br />

potential was recognized when he was selected. He<br />

was also promoted to Staff Sergeant and inducted<br />

into the U.S. Army Europe Sergeant Morales Club.<br />

That same year, SSG Wright returned to the U.S.<br />

and served as an instructor for the <strong>Intelligence</strong><br />

Analyst Course, USAIC and School, Fort Huachuca.<br />

He would then move to the NCO Academy as a Senior<br />

Instructor from 1984 to 1986, teaching <strong>Intelligence</strong><br />

Analysis. In 1987, he returned to Germany and<br />

served as the First Sergeant for Headquarters and<br />

Headquarters Battery, 56 th Field Artillery Command<br />

(Pershing Missile). In the fall <strong>of</strong> 1990, Master<br />

Sergeant Wright reported in to the 111 th MI Brigade,<br />

Fort Huachuca where he became the Operations<br />

Sergeant Major responsible for preparing plans,<br />

operations, and providing soldier training for the<br />

6,000 <strong>of</strong>ficers and enlisted personnel at the Army’s<br />

intelligence schoolhouse. After eight months as the<br />

Brigade Operations Sergeant Major, MSG Wright<br />

became the First Sergeant <strong>of</strong> C Company, 304 th MI<br />

Battalion, 111 th MI Brigade. C Company was the<br />

only deployable Pioneer Unmanned Aerial Vehicle<br />

(UAV) company in the Army. His efforts contributed<br />

to the selection <strong>of</strong> the Hunter as the Army’s<br />

next generation UAV. First Sergeant Wright was<br />

instrumental in the development <strong>of</strong> the MOS 96U<br />

UAV Operator. He served as a subject matter expert<br />

and briefed senior Army leaders worldwide on<br />

the UAV program. He also helped draft the ground<br />

rules for UAV airspace management, ensuring the<br />

safety <strong>of</strong> other military and commercial air traffic.<br />

1SG Wright was soon thereafter selected and promoted<br />

to Command Sergeant Major and attended<br />

the Command Sergeant Major’s course.<br />

In 1994 he reported to Fort Hood as the Command<br />

Sergeant Major <strong>of</strong> the 522 nd MI Battalion, 2 nd Armored<br />

Division. A year later, the unit was reflagged as the<br />

104 th MI Battalion, 4 th Infantry Division. Two years<br />

later, CSM Wright returned to Germany in 1996, and<br />

became the Command Sergeant Major <strong>of</strong> the 302 nd<br />

MI Battalion, 205 th MI Brigade. He was then selected<br />

to become the 205 th MI Brigade Command Sergeant<br />

Major. Following his successful tour in the Brigade,<br />

he was selected to serve as the INSCOM Command<br />

Sergeant Major at Fort Belvoir. As the senior enlisted<br />

advisor, his leadership was instrumental in positive<br />

changes to the command’s architecture, force struc-<br />

ture, training and combat development. He brought<br />

a unique perspective to the budgetary issues and<br />

provided input to the disposition <strong>of</strong> the command’s<br />

budget that totaled over 500 million dollars a year.<br />

CSM Wright oversaw the development and execution<br />

<strong>of</strong> the Command’s Strategic Business Plan. At<br />

the time INSCOM was responsible for over 12,500<br />

Soldiers and civilians located in 21 countries around<br />

the world. As INSCOM CSM, he also represented the<br />

Sergeant Major <strong>of</strong> the Army at various functions and<br />

meetings. CSM Ronald Wright retired in 2001 after<br />

serving his country honorably for 26 years.<br />

Command Sergeant Major Wright’s awards and<br />

decorations include the Distinguished Service<br />

Medal, the Meritorious Service Medal (4 OLCs), the<br />

Army Commendation Medal (3 OLCs), the Army<br />

Achievement Medal (1 OLC), the Army Good Conduct<br />

Medal (6 th award), the Air Force Good Conduct Medal,<br />

the National Defense Service (2 nd award), the Vietnam<br />

Service Medal, the NCO <strong>Pr<strong>of</strong>essional</strong> Development<br />

Ribbon (4 th award), the Overseas Service Ribbon (4 th<br />

award), the NATO Medal, the Republic <strong>of</strong> Vietnam<br />

Campaign Medal, the Army Superior Unit Award,<br />

the Air Force Parachute Riggers Badge, Air Assault<br />

Badge, Master Instructor Badge, and the German<br />

Marksmanship Badge. He received the Field Artillery’s<br />

Order <strong>of</strong> Saint Barbara and the MI Knowlton Award.<br />

CSM Wright is also an Honorary Member <strong>of</strong> the<br />

Sergeant Audie Murphy Club.<br />

2010 MI Corps Hall <strong>of</strong> Fame<br />

Nominations<br />

All commissioned <strong>of</strong>ficers, warrant <strong>of</strong>ficers, enlisted<br />

Soldiers, and civilian intelligence pr<strong>of</strong>essionals who<br />

have served in a U.S. Army intelligence unit or in an<br />

intelligence position elsewhere within the U.S. Army<br />

are eligible for nomination. Full nomination procedures<br />

can be obtained by contacting the Office <strong>of</strong> the<br />

Chief, <strong>Military</strong> <strong>Intelligence</strong>, Deputy Director, U.S.<br />

Army <strong>Intelligence</strong> Center and Fort Huachuca, ATTN:<br />

ATZS-MI (23), 110 Rhea Street, Second Floor, Fort<br />

Huachuca, Arizona 85613-7080, (520) 533-1190, or<br />

timothy.quinn@us.army.mil. The Nomination Board<br />

convenes annually at the direction <strong>of</strong> the Chief <strong>of</strong><br />

the MI Corps (the Commanding General, U.S. Army<br />

<strong>Intelligence</strong> Center and Fort Huachuca), usually during<br />

September/October. Although nominations are<br />

accepted year round, to be considered by the current<br />

year Nomination Board, nomination packets must be<br />

received not later than 15 September.<br />

April - June 2009 69


<strong>Pr<strong>of</strong>essional</strong> Reader<br />

Afghanistan and the Troubled<br />

Future <strong>of</strong> Unconventional Warfare<br />

by Hy S. Rothstein<br />

(Annapolis, Maryland: Naval<br />

Institute Press, 2006), 218 Pages,<br />

$17,75, ISBN 1-59114-745-X<br />

Afghanistan and the Troubled Future <strong>of</strong> Unconventional<br />

Warfare is an examination <strong>of</strong> why the U.S. <strong>Military</strong><br />

has difficulty conducting Unconventional Warfare<br />

(UW) despite the increased funding and attention<br />

given to special operations and intelligence used<br />

in conducting UW operations. The author, Hy<br />

Rothstein, is a former career Special Forces <strong>of</strong>ficer<br />

who currently teaches at the Naval Postgraduate<br />

School. He argues that the types <strong>of</strong> operations that<br />

include UW and stability operations are not necessarily<br />

best conducted by conventional means<br />

although, in Afghanistan for example, a conventional<br />

approach is what has been taken. In order<br />

to support the author’s perspective, the first<br />

one-third <strong>of</strong> the work is organized into chapters<br />

that focus on the historical context <strong>of</strong> UW. These<br />

early chapters describe how special operations<br />

have evolved to meet the challenges <strong>of</strong> these types<br />

<strong>of</strong> missions. This background is both informative<br />

and contextually relevant for those pr<strong>of</strong>essionals<br />

who deal with the complexity <strong>of</strong> UW to include<br />

Conventional Troops and Special Operations.<br />

The author focuses on Special Forces although<br />

Psychological Operations and Civil Affairs are also<br />

discussed at length.<br />

Of the many bureaucratic obstacles facing Special<br />

Operations are organizational constraints and a failure<br />

to develop processes <strong>of</strong> innovation in the army.<br />

Rothstein thus utilizes the remaining two-thirds <strong>of</strong><br />

his work in a progression that moves from theoretical<br />

to practical considerations. First, he focuses<br />

on Organizational Theory and how the concept <strong>of</strong><br />

Contingency Theory could be a more successful<br />

model for the organizational structure <strong>of</strong> the high-<br />

est levels <strong>of</strong> military decision making. For example,<br />

Rothstein argues that the Department <strong>of</strong> Defense<br />

(DOD) is not organizationally structured to allow<br />

for options that fall outside <strong>of</strong> conventional warfare<br />

paradigms. Contingency Theory, however, could potentially<br />

guide DOD decision making in a more appropriate<br />

direction for the types <strong>of</strong> future conflicts<br />

that will invariably be unconventional by definition<br />

and difficult to predict in nature. As the author<br />

notes, “Organizational scholars have concluded that<br />

Weberian-type bureaucracy found in many large,<br />

modern organizations is ineffective in coping with<br />

the demands <strong>of</strong> a dynamic and uncertain environment.<br />

Additionally, standardized procedures, a fundamental<br />

tenet <strong>of</strong> bureaucracy, inhibit innovation<br />

and the flexibility necessary to effectively operate<br />

Reviewed by First Lieutenant Nathaniel L. Moir<br />

70 <strong>Military</strong> <strong>Intelligence</strong>


under conditions <strong>of</strong> uncertainty. Contingency theory<br />

is the alternative organizational model for environments<br />

where Weberian Bureaucracy falls short.”<br />

Further, Rothstein spends a great deal <strong>of</strong> effort in<br />

demonstrating how and why UW must not be diluted<br />

by focusing on the attrition end <strong>of</strong> the spectrum<br />

<strong>of</strong> operations, a fact that is <strong>of</strong> great importance<br />

when conducting stability operations. The Special<br />

Forces, it is argued, is being over-used for direct<br />

action (DA) operations (due to there being many<br />

other assets that can conduct DA) and it needs to<br />

be tasked more usefully as practitioners <strong>of</strong> UW, a<br />

niche skill unique to special operations.<br />

When stability operations are considered in the<br />

context <strong>of</strong> the War on Terror, urgency is added as<br />

<strong>American</strong> public support is needed to continue<br />

political support for the army’s work in Iraq and<br />

Afghanistan. Rothstein supports the view that<br />

success in those campaigns must be measured<br />

by the confidence <strong>of</strong> the host nation populace:<br />

“The war on terrorism requires the use <strong>of</strong> Special<br />

Forces teams, and Civil Affairs and Psychological<br />

Operations units, all tasked to do UW. Success in<br />

this war will require an emphasis on winning local<br />

cooperation. Conventional and DA forces are least<br />

likely to elicit this, while UW forces are most likely<br />

to.” The dichotomy, as described by Mr. Rothstein,<br />

<strong>of</strong> how conventional and unconventional capabilities<br />

conduct stability operations elicits a historical<br />

comparison <strong>of</strong> stability operations with the Gordian<br />

knot. How to best metaphorically unknot that classical<br />

enigma may be through the type <strong>of</strong> organizational<br />

structure that best utilizes Contingency<br />

Theory. However, it may also be the type <strong>of</strong> organization<br />

that is structurally aligned with that theory<br />

but still possesses the flexibility to incorporate<br />

conventional capabilities and forces. In sum, Mr.<br />

Rothstein’s work poses important questions that<br />

may guide decision making and organizational<br />

structure for conflicts, in Afghanistan and elsewhere,<br />

that require UW capabilities.<br />

April - June 2009 71


<strong>Intelligence</strong> Philatelic Vignettes<br />

“Operation Ruthless”<br />

by Mark Sommer<br />

By 1940 the greatest threat to the Allies was U-boat attacks on North Atlantic convoys. If the Allies could<br />

discover in advance where U-boat packs were assembling, they could direct convoys away from them.<br />

Bletchley Park’s code breakers were not breaking German Naval Enigma code. It was essential that current<br />

Naval Enigma material for them to work on should be captured from German ships. On 12 September<br />

1940, Lieutenant Commander Ian Fleming, RNVR, Personal Assistant to the Director <strong>of</strong> Naval <strong>Intelligence</strong>,<br />

concocted an extraordinary plan to crash-land a captured German plane in the English Channel and overpower<br />

the patrol boat crew that came to rescue its “survivors,” thereby gaining access to the much needed<br />

code books. Fleming’s proposal, Codename ‘Operation Ruthless’ was as follows:<br />

Fleming added that the pilot should be a ‘tough bachelor able to swim’; and that a German-speaker would<br />

also be needed to travel on the bomber. He put his own name forward. Is it coincidental that Commander<br />

James Bond, RN, 007, was also tough, a bachelor and an accomplished linguist? ‘Operation Ruthless’ was<br />

quickly given the go-ahead. A plane and crew were procured and Fleming travelled down to Dover to put<br />

it into practice. However, to the deep frustration <strong>of</strong> the Bletchley Park’s code breakers, the plan was abandoned<br />

due to the lack <strong>of</strong> suitable German boats operating at night.<br />

Frank Birch, Head <strong>of</strong> German Naval Section at Bletchley Park, lamented that “Turing and Twinn (both<br />

key code breakers at Bletchley Park) came to me like undertakers cheated <strong>of</strong> a nice corpse ... all in a stew<br />

about the cancellation <strong>of</strong> Operation Ruthless.” It now seemed that only the Naval equivalent <strong>of</strong> a miracle<br />

would enable the code breakers to break into Naval Enigma but the prolific genius <strong>of</strong> Ian Fleming for writing<br />

spy plots had been born.<br />

The Bletchley Park Post Office, in cooperation with their Museum Trust, produces highly collectible philatelic items, and as<br />

part <strong>of</strong> their fundraising functions, produced these stamps and commemorative covers, to honor the birth <strong>of</strong> James Bond<br />

creator/author Ian Fleming, on his one hundredth birthday, January 8, 2008.<br />

72 <strong>Military</strong> <strong>Intelligence</strong>


COntACt And ArtIClE<br />

Submission Information<br />

This is your magazine. We need your support by writing and submitting articles for publication.<br />

When writing an article, select a topic relevant<br />

to the <strong>Military</strong> <strong>Intelligence</strong> (MI) and <strong>Intelligence</strong><br />

Communities (IC).<br />

Articles about current operations and exercises;<br />

TTPs; and equipment and training are always welcome<br />

as are lessons learned; historical perspectives;<br />

problems and solutions; and short “quick tips” on<br />

better employment or equipment and personnel. Our<br />

goals are to spark discussion and add to the pr<strong>of</strong>essional<br />

knowledge <strong>of</strong> the MI Corps and the IC at large.<br />

Propose changes, describe a new theory, or dispute<br />

an existing one. Explain how your unit has broken<br />

new ground, give helpful advice on a specific topic, or<br />

discuss how new technology will change the way we<br />

operate.<br />

When submitting articles to MIPB, please take the<br />

following into consideration:<br />

Ê Feature articles, in most cases, should be under<br />

3,000 words, double-spaced with normal margins<br />

without embedded graphics. Maximum length is<br />

5,000 words.<br />

Ê Be concise and maintain the active voice as much<br />

as possible.<br />

Ê We cannot guarantee we will publish all submitted<br />

articles and it may take up to a year to publish<br />

some articles.<br />

Ê Although MIPB targets themes, you do not need to<br />

“write” to a theme.<br />

Ê Please note that submissions become property <strong>of</strong><br />

MIPB and may be released to other government<br />

agencies or nonpr<strong>of</strong>it organizations for re-publication<br />

upon request.<br />

What we need from you:<br />

Ê A release signed by your unit or organization’s<br />

information and operations security <strong>of</strong>ficer/<br />

SSO stating that your article and any accompanying<br />

graphics and photos are unclassified,<br />

nonsensitive, and releasable in the public domain<br />

OR that the article and any accompanying<br />

graphics and photos are unclassified/FOUO (IAW<br />

AR 380-5 DA Information Security Program). A<br />

sample security release format can be accessed at<br />

our website at https://icon.army.mil.<br />

Ê A cover letter (either hard copy or electronic) with<br />

your work or home email addresses, telephone<br />

number, and a comment stating your desire to<br />

have your article published.<br />

Ê Your article in Word. Do not use special document<br />

templates.<br />

Ê A Public Affairs or any other release your installation<br />

or unit/agency may require. Please include<br />

that release(s) with your submission.<br />

Ê Any pictures, graphics, crests, or logos which are<br />

relevant to your topic. We need complete captions<br />

(the Who, What, Where, When, Why, and How),<br />

photographer credits, and the author’s name on<br />

photos. Do not embed graphics or photos within<br />

the article. Send them as separate files such as<br />

.tif or .jpg and note where they should appear<br />

in the article. PowerPoint (not in .tif or .jpg<br />

format) is acceptable for graphs, etc. Photos<br />

should be at 300 dpi.<br />

Ê The full name <strong>of</strong> each author in the byline and a<br />

short biography for each. The biography should<br />

include the author’s current duty assignment,<br />

related assignments, relevant civilian education<br />

and degrees, and any other special qualifications.<br />

Please indicate whether we can print your contact<br />

information, email address, and phone numbers<br />

with the biography.<br />

We will edit the articles and put them in a style and<br />

format appropriate for MIPB. From time to time, we<br />

will contact you during the editing process to help<br />

us ensure a quality product. Please inform us <strong>of</strong> any<br />

changes in contact information.<br />

Submit articles, graphics, or questions to the<br />

Editor at mipb@conus.army.mil. Our fax number is<br />

520.538.1005. Submit articles by mail on disk to:<br />

MIPB<br />

ATTN ATZS-CDI-DM (Smith)<br />

U.S. Army <strong>Intelligence</strong> Center and Fort Huachuca<br />

Box 2001, Bldg. 51005<br />

Fort Huachuca, AZ 85613-7002<br />

Contact phone numbers: Commercial 520.538.0956<br />

DSN 879.0956.<br />

April - June 2009 73


74 <strong>Military</strong> <strong>Intelligence</strong>


April - June 2009 75


Nomination Information for the 2010<br />

C SM Doug Russell Award<br />

The annual CSM Doug Russell Award recognizes<br />

the outstanding achievements <strong>of</strong> Soldiers within<br />

or on the behalf <strong>of</strong> the <strong>Military</strong> <strong>Intelligence</strong> (MI)<br />

Community. Eligibility criteria include:<br />

Ê Rank <strong>of</strong> sergeant (E-5) or below.<br />

Ê In the Active Army, Army Reserve, or National<br />

Guard.<br />

Ê Actions that directly contribute to the MI Corps.<br />

Ê Must be fully eligible for re-enlistment.<br />

Ê Does not have to hold an MI MOS.<br />

Anyone may nominate a Soldier for this award.<br />

There can be only one nomination from each <strong>of</strong> the<br />

following:<br />

Ê MI Group, Brigade, Battalion.<br />

Ê Brigade Troop/Support Battalions within a maneuver<br />

division.<br />

Ê MI Support Elements (G2/Brigade S2/Battalion<br />

S2) within a maneuver division.<br />

Ê DCSINT oriented organizations (EAC units and<br />

positions not formally assigned to a specific MI<br />

Group/Brigade/Battalion).<br />

Nomination packets must be unclassified. All<br />

classified packets are automatically eliminated<br />

from the award process. Nomination packets must<br />

be submitted in hard copy only (No disk or email).<br />

The only exception is the photograph, which must<br />

be sent via email to the POCs, in addition to the<br />

hardcopy. Packets must contain:<br />

Ê Cover letter signed by the originator <strong>of</strong> the<br />

nomination.<br />

Ê Narrative specifically stating the nominee’s key<br />

accomplishments and achievements, and the<br />

impact on the MI Corps.<br />

Ê Endorsement letter from the first 0-6 in the<br />

chain <strong>of</strong> command.<br />

Ê Biography <strong>of</strong> the nominee.<br />

Ê 8" X 10" photograph <strong>of</strong> the nominee in Class A<br />

uniform (DA Photograph preferred).<br />

Ê Copy <strong>of</strong> the nominee’s Enlisted Record Brief.<br />

Ê Completed DD Form 2266 Hometown News<br />

Release Information (Unsigned).<br />

Waivers for other than an 0-6 endorsement may be<br />

requested from the POC below.<br />

Unclassified nomination packets must be sent via<br />

Certified Mail to the MI Corps CSM to:<br />

Headquarters, U.S. Army <strong>Intelligence</strong><br />

Center and Ft. Huachuca<br />

ATTN: CSM Doug Russell Award (ATZS-CSM)<br />

Alvarado Hall 1903 Hatfield Street<br />

Fort Huachuca, AZ 85613-6000<br />

Nominations must be received by 15 December<br />

2009. Nomination packets will be reviewed from<br />

4 to 8 January 2010 by a board consisting <strong>of</strong> the<br />

MI Corps CSM, Honorary MI Corps CSM, INSCOM<br />

CSM, Army DCSINT G2 CSM, and CSM Doug<br />

Russell, Retired. The Chief <strong>of</strong> the MI Corps has final<br />

approval <strong>of</strong> the board results.<br />

The winner will be invited to attend the MI CSM/<br />

SGM conference in March 2010 to receive:<br />

Ê The CSM Doug Russell Award.<br />

Ê The Knowlton Award (Courtesy <strong>of</strong> MICA).<br />

Ê A one year MICA membership (Courtesy <strong>of</strong> MICA).<br />

Ê The <strong>American</strong> <strong>Military</strong> Society President’s Coin.<br />

Ê A one year membership in the <strong>American</strong> <strong>Military</strong><br />

Society.<br />

Ê A plaque inscribed with the MI Soldier’s Creed.<br />

Ê A $150.00 gift certificate from AAFES.<br />

The winner will be announced NLT 22 January<br />

2010.<br />

POC: CSM Wyk<strong>of</strong>f at DSN 821-1145 or 821-1146;<br />

Comm (520) 533-1145 or 533-1146 and via email at<br />

gerardus.wyk<strong>of</strong>f@conus.army.mil OR SGM Phillip<br />

Sharper at DSN 879-1211; Comm (520) 538-1211)<br />

and via email at phillip.sharper@conus.army.mil.<br />

76 <strong>Military</strong> <strong>Intelligence</strong>


Sergeant Julian M. Jones<br />

2009 Doug Russell Award Recipient<br />

Sergeant Jones was born on 19 April 1985 in Boone, Iowa. He graduated from Basic Training at Fort<br />

Jackson, South Carolina in June 2003 and went to the Defense Language Institute (DLI), Monterey,<br />

California. At that time, he was a Signals <strong>Intelligence</strong> Soldier, but during the course <strong>of</strong> his Korean studies,<br />

he switched to MOS 35M, Human <strong>Intelligence</strong> (HUMINT) Collector. After DLI, he came to Fort Huachuca,<br />

Arizona to complete his Advanced Individual Training.<br />

His first duty station was Bravo Company, 524 th MI Battalion, 501 st MI Brigade, Republic <strong>of</strong> Korea. From<br />

December 2005 until June 2006, SGT Jones served as a liaison <strong>of</strong>ficer in the Waegwan MI Detachment.<br />

In 2006, he deployed to Afghanistan in support <strong>of</strong> the Combined Joint Special Operations Task Force-<br />

Afghanistan (CJSOTF-A).<br />

While in Afghanistan, SGT Jones served as a Tactical HUMINT Team Leader for fifteen months. He conducted<br />

over 40 enemy prisoner <strong>of</strong> war interrogations at a field detention site and was responsible for maintaining<br />

the site, enabling intelligence operations to occur at a remote firebase. The intelligence collected<br />

at this location drove successful operations for CJSOTF-A forces. He was awarded the Bronze Star Medal,<br />

the Purple Heart, and the Combat Action Badge for his accomplishments and contributions during this<br />

deployment.<br />

Upon returning from this deployment, SGT Jones was assigned to the Busan MI Detachment, also a<br />

part <strong>of</strong> the 524 th MI Battalion. While assigned to the Busan detachment, he provided language support to<br />

the Force Protection mission and was in charge <strong>of</strong> the Strategic Debriefing mission. From November 2007<br />

until November 2008, he played a major role in the surge operations for Key Resolve and other operations<br />

and exercises.<br />

His dedication to the HUMINT mission, the combination <strong>of</strong> his experience, language, and strategic debriefing<br />

credentials make him a major contributor to the 524 th MI Battalion’s and the U.S. Army’s tactical<br />

and strategic missions.


ATTN: MIPB (ATZS-CDI-DM-12)<br />

BOX 2001<br />

BLDG 51005<br />

FORT HUACHUCA AZ 85613-7002<br />

Headquarters, Department <strong>of</strong> the Army.<br />

This publication is approved for public release.<br />

Distribution unlimited.<br />

PIN: 085736-000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!